1. decrypt ciphertext
- l33t
- page source
2. admin login
3. HTTP GET
4. vim jail & system cracking
- Ctrl + z : escape without exiting vim program
- password file : /etc/passwd /etc/shadow
- using vim more : http://developersnote.blogspot.com/2011/01/vi.html
5. hidden key in BMP file
- vim command: wc (number of lines, words, characters of a file), du(size of file)
- hexedit (hex editor) & bmp file format
6. weird icon
7. basic BOF
- stack frame
- using perl : ./(execution_file) `perl 'print -e "A"x16 . "\x50"'`
8. advanced BOF
- shellcode
9. reversing
- link: http://uiandwe.tistory.com/category/%EB%87%8C%EC%84%B8%ED%8F%AC%EB%8D%A9%EC%96%B4%EB%A6%AC%22%22/%EB%A6%AC%EB%B2%84%EC%8B%B1
reference
-----------
When searching result is bad ... GO TO YOUTUBE !
CTF problems type : http://beist.org/new_ver_board/read.html?table=new_freeboard&uid=199&page=93
Web application attack type : http://blog.daum.net/f85t75/2576448, http://acc.ahnlab.com/secu_view.asp?seq=4743
- l33t
- page source
2. admin login
3. HTTP GET
4. vim jail & system cracking
- Ctrl + z : escape without exiting vim program
- password file : /etc/passwd /etc/shadow
- using vim more : http://developersnote.blogspot.com/2011/01/vi.html
5. hidden key in BMP file
- vim command: wc (number of lines, words, characters of a file), du(size of file)
- hexedit (hex editor) & bmp file format
6. weird icon
7. basic BOF
- stack frame
- using perl : ./(execution_file) `perl 'print -e "A"x16 . "\x50"'`
8. advanced BOF
- shellcode
9. reversing
- link: http://uiandwe.tistory.com/category/%EB%87%8C%EC%84%B8%ED%8F%AC%EB%8D%A9%EC%96%B4%EB%A6%AC%22%22/%EB%A6%AC%EB%B2%84%EC%8B%B1
reference
-----------
When searching result is bad ... GO TO YOUTUBE !
CTF problems type : http://beist.org/new_ver_board/read.html?table=new_freeboard&uid=199&page=93
Web application attack type : http://blog.daum.net/f85t75/2576448, http://acc.ahnlab.com/secu_view.asp?seq=4743
댓글 없음:
댓글 쓰기