Recent posts

Phoenix - Net Two

This level gets 64 random bytes and stores them in **quad** then it loops over **quad** 8 bytes at a time and adds th...

1 minute read

Phoenix - Net One

This code generates 4 random bytes integer and sends to to the receiver as raw bytes. The goal here is to convert the...

1 minute read

Phoenix - Net Zero

The goal of this level is to read a random number from a server (localhost in this case) and send it back in little e...

1 minute read

Phoenix - Heap Three

This level is by far the hardest one and I learned a lot from it, I really encourage you to read through the referenc...

9 minute read

Phoenix - Heap Two

The is a classic use-after-free (**UAF**) exploit, if we enter **"auth AAAA"** the code allocates memory and stores i...

3 minute read

Phoenix - Heap One

This code uses **strcpy** without size checking just like the previous level, but there is not function pointer here ...

2 minute read

Phoenix - Heap Zero

To learn more about heap exploitation, see the references at the end. We will work with the **32bit** binaries for th...

1 minute read

Phoenix - Format Four

The idea of this level is the same as the previous one but instead of overwriting a variable we overwrite the **GOT**...

3 minute read