Binary Exploitation CTF
-
Updated
Feb 18, 2023 - C
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Binary Exploitation CTF
My writeups for challenges on CTFwiki
This repo is a deep-dive into the Eternal Blue buffer overflow attack, included is the exploit source code, and extensive documentation.
Web page with the visualization of an exploit for a vulnerability of Marvin Minsky's universal Turing machine
Lab and Final Reports for Computer Networks and Security class
A script-storage for public use.
42 | Privilege escalation exercices on a system image
Multiple vulnerabilities in Mitel Unify OpenStage and OpenScape phones allow a remote compromise in the unhardened default configuration and an elevation of privileges to become the root user.
Python3 version of the Python2 exploit for CVE-2019-9053
Created by The cybersecurity community