Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
n1ghtw0lf
  • Malware Analysis
  • Binary Exploitation
  • CTF Writeups
  • Tutorials
  • All Categories
    Abdallah Elshinbary

    Abdallah Elshinbary

    Malware Analysis & Reverse Engineering Adventures.

    • Email
    • Twitter
    • LinkedIn
    • GitHub
    • Buy Me a Coffee

    Recent posts

    Binary Exploitation

    Phoenix - Stack Two

    This level is identical to the previous one except that we need to put the exploit in **ExploitEducation** environmen...

    02 Feb 2020

    less than 1 minute read

    Binary Exploitation

    Phoenix - Stack One

    This code uses **strcpy** function which is dangerous because the source size could be more than destination size. Th...

    02 Feb 2020

    1 minute read

    Binary Exploitation

    Phoenix - Stack Zero

    The code uses **gets** function which can take input more than buffer length, hence the exploit :) This level only as...

    01 Feb 2020

    less than 1 minute read

    • Previous
    • 1
    • …
    • 6
    • 7
    • 8
    • Next
    • Follow:
    • Feed
    © 2024 Abdallah Elshinbary. Powered by Jekyll & Minimal Mistakes.