CTF – Bulldog

What do you need? Bulldog .OVA: https://www.vulnhub.com/entry/bulldog-1,211/ Virtual Environment: VirtualBox or VMWare Attack machine, such as: Kali Linux Walkthrough! 1) As always, a quick ifconfig reveals what DHCP is giving us, Kali, for an IP address. In my case I am issued 192.168.56.101 with a Class C subnet mask. That gives me enough information to … Continue reading CTF – Bulldog

Advertisements

Walkthrough – Protostar Stack5

Overview: In Protostar's Stack5 challenge, we will actually perform a buffer overflow with shell code! And to change things up, there's no more variables! What do you need? Download Protostar: https://exploit-exercises.com/download/ Stack 5 Source: https://exploit-exercises.com/protostar/stack5/ Kali VM (Optional): https://www.kali.org/downloads/ Before you start! Prior to starting this I want to mention that there are some easier … Continue reading Walkthrough – Protostar Stack5

Walkthrough – Protostar Stack4

Overview: In Protostar's Stack4 challenge, we again learn to control the flow of the program. However, there's no local variables to overwrite anymore! What do you need? Download Protostar: https://exploit-exercises.com/download/ Stack 4 Source: https://exploit-exercises.com/protostar/stack4/ Kali VM (Optional): https://www.kali.org/downloads/ Before you start! One huge take-away from looking at the source is that there's no longer a … Continue reading Walkthrough – Protostar Stack4

Walkthrough – Protostar Stack2

Overview: In Protostar's Stack2 challenge, we leverage an environmental variable to perform our buffer overflow! What do you need? Download Protostar: https://exploit-exercises.com/download/ Stack 2 Source: https://exploit-exercises.com/protostar/stack2/ Before you start! A sharp eye would notice that anything we provide as a parameter to stack2 is irrelevant. Why? Because there's a check to see if variable == … Continue reading Walkthrough – Protostar Stack2