all InfoSec news
Injecting 0x113 — Format String Binary Exploitation
System Weakness - Medium systemweakness.com
Injecting 0x113 — Format String Binary Exploitation
Recently, I had fun exploring format string binary exploitation. I want to share a step-by-step walkthrough on it and I hope everyone finds it interesting. This binary used specific flags during compilation and execution, as shown below.
Let’s start by disassembling the main function. It calls three user-defined functions: validate_params, bazinga, and that_fyi_was_sarcasm.
validate_params → This function validates the number of parameters passed to the program. 0x8048618 <+3> compares the …
binary binary exploitation ctf defined exploitation format string fun function hope main reverse engineering share start walkthrough