March 13, 2023, 1:16 p.m. | f3ru0s Kormy

System Weakness - Medium systemweakness.com

Binary Exploitation Category;

~ In this article, we will cover:

  1. Introduction
  2. Stonks Writeup

1. Introduction

2. Stonks Writeup.

Description

I decided to try something noone else has before. I made a bot to automatically trade stonks for me using AI and machine learning. I wouldn’t believe you if you told me it’s unsecure!

nc mercury.picoctf.net 59616

Solution

After opening the file, both in nc and looking at the code vuln.c,
The inputs of the API token were being taken and …

ai and machine learning api article binary binary exploitation bot code ctf-writeup exploitation file hacking inputs machine machine learning malloc memory memory allocation mercury .net picoctf taken token trade vuln writeup

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC