mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/hacking-blogposts.git
synced 2025-05-16 04:16:59 +00:00
fix the hacking tutorials
This commit is contained in:
parent
325b9c3814
commit
673311896a
21 changed files with 207 additions and 489 deletions
68
binexp.md
68
binexp.md
|
@ -4,15 +4,15 @@
|
|||
|
||||
##### Below you fill find my binary exploitation learning notes, the easier challenges are at the top, and the further down you go, the more we dig into advanced concepts.
|
||||
|
||||
[ Template Page ](0/0.html)
|
||||
[ Template Page ](0/0.md)
|
||||
|
||||
 nihilist
|
||||
|
||||
##### Preparing the Tools
|
||||
|
||||
1. [Installing gdb gef](0/gdb.html)
|
||||
2. [Installing py pwntools](0/pwntools.html)
|
||||
3. [Installing GHIDRA](0/ghidra.html)
|
||||
1. [Installing gdb gef](0/gdb.md)
|
||||
2. [Installing py pwntools](0/pwntools.md)
|
||||
3. [Installing GHIDRA](0/ghidra.md)
|
||||
|
||||
|
||||
|
||||
|
@ -28,9 +28,9 @@
|
|||
|
||||
The basics of reversing with simple to understand examples
|
||||
|
||||
1. [✅ Strings](1/strings.html)
|
||||
2. [✅ Helithumper RE](1/heli.html)
|
||||
3. [✅ CSAW 2019 Beleaf](1/beleaf.html)
|
||||
1. [✅ Strings](1/strings.md)
|
||||
2. [✅ Helithumper RE](1/heli.md)
|
||||
3. [✅ CSAW 2019 Beleaf](1/beleaf.md)
|
||||
|
||||
|
||||
* | grep strings chmod
|
||||
|
@ -45,12 +45,12 @@ The basics of reversing with simple to understand examples
|
|||
|
||||
These are the most common binary exploits, they are there because of insecure functions that do not set a limit to user input, allowing the user to overwrite other memory registers.
|
||||
|
||||
1. [✅ CSAW 2018 Quals boi](2/boi.html)
|
||||
2. [✅ TAMU 2019 pwn1](2/pwn1.html)
|
||||
3. [✅ TW 2017 Just Do It!](2/just.html)
|
||||
4. [✅ CSAW 2016 Warmup](2/warm.html)
|
||||
5. [✅ CSAW 2018 Get it](2/get.html)
|
||||
6. [✅ TUCTF 2017 Vulnchat](2/vuln.html)
|
||||
1. [✅ CSAW 2018 Quals boi](2/boi.md)
|
||||
2. [✅ TAMU 2019 pwn1](2/pwn1.md)
|
||||
3. [✅ TW 2017 Just Do It!](2/just.md)
|
||||
4. [✅ CSAW 2016 Warmup](2/warm.md)
|
||||
5. [✅ CSAW 2018 Get it](2/get.md)
|
||||
6. [✅ TUCTF 2017 Vulnchat](2/vuln.md)
|
||||
|
||||
|
||||
|
||||
|
@ -69,13 +69,13 @@ These are the most common binary exploits, they are there because of insecure fu
|
|||
|
||||
As i hit the shellcode buffer overflow binary challenges, i realized that i needed assembly skills, so this is a simple introduction to modern intel Assembly for the x86_64 (64bits) architecture. We make use of the [syscalls](https://chromium.googlesource.com/chromiumos/docs/+/HEAD/constants/syscalls.md#x86_64-64_bit) used to communicate with the Linux Kernel:
|
||||
|
||||
1. [✅ Hello World](asm/1.html)
|
||||
2. [✅ Hello World Explained ](asm/2.html)
|
||||
3. [✅ Jumps, Calls](asm/3.html)
|
||||
4. [✅ User Input](asm/4.html)
|
||||
5. [✅ Math Operations](asm/5.html)
|
||||
6. [✅ Reading / Writing Files](asm/6.html)
|
||||
7. [✅ Spawning a shell](asm/7.html)
|
||||
1. [✅ Hello World](asm/1.md)
|
||||
2. [✅ Hello World Explained ](asm/2.md)
|
||||
3. [✅ Jumps, Calls](asm/3.md)
|
||||
4. [✅ User Input](asm/4.md)
|
||||
5. [✅ Math Operations](asm/5.md)
|
||||
6. [✅ Reading / Writing Files](asm/6.md)
|
||||
7. [✅ Spawning a shell](asm/7.md)
|
||||
|
||||
|
||||
|
||||
|
@ -83,17 +83,17 @@ As i hit the shellcode buffer overflow binary challenges, i realized that i need
|
|||
|
||||
##### 2) Stack Buffer Overflows (Part 2)
|
||||
|
||||
1. [✅ CSAW 2017 Pilot](2/pilot.html)
|
||||
2. [✅ Tamu 2019 pwn3](2/pwn3.html)
|
||||
3. [✅ Tuctf 2018 shella-easy](2/shella.html)
|
||||
4. [✅ BKP 2016 calc](2/calc.html)
|
||||
5. [✅ DCQuals 2019 speed](2/speed.html)
|
||||
6. [✅ DCQuals 2016 feed](2/feed.html)
|
||||
7. [✅ CSAW 2019 babyboi](2/bboi.html)
|
||||
8. [✅ CSAW 2017 SVC](2/svc.html)
|
||||
9. [✅ FB 2019 Overfloat](2/overf.html)
|
||||
10. [✅ hs 2019 storytime](2/hs.html)
|
||||
11. [✅ UTC 2019 shellme](2/shme.html)
|
||||
1. [✅ CSAW 2017 Pilot](2/pilot.md)
|
||||
2. [✅ Tamu 2019 pwn3](2/pwn3.md)
|
||||
3. [✅ Tuctf 2018 shella-easy](2/shella.md)
|
||||
4. [✅ BKP 2016 calc](2/calc.md)
|
||||
5. [✅ DCQuals 2019 speed](2/speed.md)
|
||||
6. [✅ DCQuals 2016 feed](2/feed.md)
|
||||
7. [✅ CSAW 2019 babyboi](2/bboi.md)
|
||||
8. [✅ CSAW 2017 SVC](2/svc.md)
|
||||
9. [✅ FB 2019 Overfloat](2/overf.md)
|
||||
10. [✅ hs 2019 storytime](2/hs.md)
|
||||
11. [✅ UTC 2019 shellme](2/shme.md)
|
||||
|
||||
|
||||
|
||||
|
@ -115,9 +115,9 @@ As i hit the shellcode buffer overflow binary challenges, i realized that i need
|
|||
|
||||
##### 3) Bad Seed
|
||||
|
||||
1. [✅ h3 time ](3/h3.html)
|
||||
2. [✅ hsctf 2019 tux talk ](3/tux.html)
|
||||
3. [✅ Sunshine 17 Prepared ](3/prep.html)
|
||||
1. [✅ h3 time ](3/h3.md)
|
||||
2. [✅ hsctf 2019 tux talk ](3/tux.md)
|
||||
3. [✅ Sunshine 17 Prepared ](3/prep.md)
|
||||
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue