Recent posts

Phoenix - Heap One

This code uses **strcpy** without size checking just like the previous level, but there is not function pointer here ...

2 minute read

Phoenix - Heap Zero

To learn more about heap exploitation, see the references at the end. We will work with the **32bit** binaries for th...

1 minute read

Phoenix - Format Four

The idea of this level is the same as the previous one but instead of overwriting a variable we overwrite the **GOT**...

3 minute read

Phoenix - Format Three

This level has the same issue as the previous one so we will solve the 32bit version. The goal of this level is to wr...

4 minute read

Phoenix - Format Two

The goal of this level is to use the format string vulnerability to write to a memory address **changeme**...

2 minute read

Phoenix - Format One

This level is the same as the last one except that we need set **changeme** to a specific value **0x45764f6c** instea...

less than 1 minute read

Phoenix - Format Zero

To learn about format string vulnerability see the references at the end. This code uses **sprintf** function to writ...

2 minute read

Phoenix - Stack Six

This level exploits the 1‑byte buffer overflow, to learn more about it read the references at the end. This code read...

5 minute read