Recent posts
Phoenix - Net Two
This level gets 64 random bytes and stores them in **quad** then it loops over **quad** 8 bytes at a time and adds th...
Phoenix - Net One
This code generates 4 random bytes integer and sends to to the receiver as raw bytes. The goal here is to convert the...
Phoenix - Net Zero
The goal of this level is to read a random number from a server (localhost in this case) and send it back in little e...
Phoenix - Heap Three
This level is by far the hardest one and I learned a lot from it, I really encourage you to read through the referenc...
Phoenix - Heap Two
The is a classic use-after-free (**UAF**) exploit, if we enter **"auth AAAA"** the code allocates memory and stores i...
Phoenix - Heap One
This code uses **strcpy** without size checking just like the previous level, but there is not function pointer here ...
Phoenix - Heap Zero
To learn more about heap exploitation, see the references at the end. We will work with the **32bit** binaries for th...
Phoenix - Format Four
The idea of this level is the same as the previous one but instead of overwriting a variable we overwrite the **GOT**...