How to Exploit a Buffer Overflow Vulnerability
In this challenge we will exploit a simple buffer overflow vulnerability and execute arbitrary code!…
In this challenge we will exploit a simple buffer overflow vulnerability and execute arbitrary code!…
In this challenge we take a look at a simple C++ binary. This challenge was written for Windows but we were able to do all of our analysis on a Kali VM. Read on to see how I solved this challenge!…
In this post, we solve a simple crackme written in C++. Fair warning the author used some foul language in the binary if we enter an incorrect password.…
Do you like going fast? In this challenge we use IDA Pro to solve this simple challenge.…
In this blog post, we tackle another Windows binary. Reverse engineering is truly an art. I hope you enjoy this masterpiece.…
In this blog post, we learn how to combine a debug binary with the executable part! This makes reversing in Ghidra so much easier!…
In this challenge, we have to save Scooby! With IDA, we reverse engineer the binary to find Scooby!…
In this blog post, we use Ghidra to reverse engineer a fairly simple binary. No crazy tricks in this challenge just straight reversing!…