How to Exploit a Buffer Overflow Vulnerability
In this challenge we will exploit a simple buffer overflow vulnerability and execute arbitrary code!…
In this challenge we will exploit a simple buffer overflow vulnerability and execute arbitrary code!…
In this crackme we are exposed to floating point number instructions!…
In this post, we solve a simple crackme written in C++. Fair warning the author used some foul language in the binary if we enter an incorrect password.…
In this blog post, we get up close and personal with stack frames. The author tries to throw us off by creating noise in the stack.…
Do you like going fast? In this challenge we use IDA Pro to solve this simple challenge.…
In this blog post, we tackle another Windows binary. Reverse engineering is truly an art. I hope you enjoy this masterpiece.…
In this blog post, we learn how to combine a debug binary with the executable part! This makes reversing in Ghidra so much easier!…
In this challenge, we have to save Scooby! With IDA, we reverse engineer the binary to find Scooby!…