add hacking blogposts as they are

This commit is contained in:
oxeo0 2025-05-07 01:02:00 +02:00
parent fa65088be1
commit 325b9c3814
1904 changed files with 91353 additions and 0 deletions

129
binexp.md Normal file
View file

@ -0,0 +1,129 @@
# Binary Exploitation
![](0.png)
##### Below you fill find my binary exploitation learning notes, the easier challenges are at the top, and the further down you go, the more we dig into advanced concepts.
[ Template Page ](0/0.html)
![](../assets/img/user.png) nihilist
##### Preparing the Tools
1. [Installing gdb gef](0/gdb.html)
2. [Installing py pwntools](0/pwntools.html)
3. [Installing GHIDRA](0/ghidra.html)
* |
* |
* |
![](../assets/img/user.png) nihilist
##### 1) Beginner Reversing
The basics of reversing with simple to understand examples
1. [✅ Strings](1/strings.html)
2. [✅ Helithumper RE](1/heli.html)
3. [✅ CSAW 2019 Beleaf](1/beleaf.html)
* | grep strings chmod
* | ghidra, pointers, scanf, puts, arrays, hexa to ascii
* | ghidra, pointers, arrays, functions
![](../assets/img/user.png) nihilist
##### 2) Stack Buffer Overflows
These are the most common binary exploits, they are there because of insecure functions that do not set a limit to user input, allowing the user to overwrite other memory registers.
1. [✅ CSAW 2018 Quals boi](2/boi.html)
2. [✅ TAMU 2019 pwn1](2/pwn1.html)
3. [✅ TW 2017 Just Do It!](2/just.html)
4. [✅ CSAW 2016 Warmup](2/warm.html)
5. [✅ CSAW 2018 Get it](2/get.html)
6. [✅ TUCTF 2017 Vulnchat](2/vuln.html)
* | gbof variable, db-gef,elf, little endian, ghidra, offsets
* | bof variable
* | bof variable
* | bof callfunction
* | bof callfunction
* | bof callfunction
![](../assets/img/user.png) nihilist
##### Assembly x86_64
As i hit the shellcode buffer overflow binary challenges, i realized that i needed assembly skills, so this is a simple introduction to modern intel Assembly for the x86_64 (64bits) architecture. We make use of the [syscalls](https://chromium.googlesource.com/chromiumos/docs/+/HEAD/constants/syscalls.md#x86_64-64_bit) used to communicate with the Linux Kernel:
1. [✅ Hello World](asm/1.html)
2. [✅ Hello World Explained ](asm/2.html)
3. [✅ Jumps, Calls](asm/3.html)
4. [✅ User Input](asm/4.html)
5. [✅ Math Operations](asm/5.html)
6. [✅ Reading / Writing Files](asm/6.html)
7. [✅ Spawning a shell](asm/7.html)
![](../assets/img/user.png) nihilist
##### 2) Stack Buffer Overflows (Part 2)
1. [✅ CSAW 2017 Pilot](2/pilot.html)
2. [✅ Tamu 2019 pwn3](2/pwn3.html)
3. [✅ Tuctf 2018 shella-easy](2/shella.html)
4. [✅ BKP 2016 calc](2/calc.html)
5. [✅ DCQuals 2019 speed](2/speed.html)
6. [✅ DCQuals 2016 feed](2/feed.html)
7. [✅ CSAW 2019 babyboi](2/bboi.html)
8. [✅ CSAW 2017 SVC](2/svc.html)
9. [✅ FB 2019 Overfloat](2/overf.html)
10. [✅ hs 2019 storytime](2/hs.html)
11. [✅ UTC 2019 shellme](2/shme.html)
* | bof shellcode
* | bof shellcode
* | bof shellcode
* | bof ROP Chain, ROP Gadgets
* | bof ROP Chain, ROP Gadgets
* | bof ROP Chain, ROP Gadgets
* | bof dynamic
* | bof dynamic
* | bof dynamic
* | bof dynamic
* | bof dynamic
![](../assets/img/user.png) nihilist
##### 3) Bad Seed
1. [✅ h3 time ](3/h3.html)
2. [✅ hsctf 2019 tux talk ](3/tux.html)
3. [✅ Sunshine 17 Prepared ](3/prep.html)
* | time seed
* | time seed
* | time seed