Jump to content
Tuts 4 You
Sign in to follow this  

Linux binary to exploit

Recommended Posts


Hi guys. I have a linux "hacking challenge" x64 binary that is difficult to exploit, you can find it attached to this email.

This binary it's vulnerable to buffer overflow + ROP + canary bypass, so will be possible to execute shellcode.

The vulnerable input fields are "HOURS WORKED" and "REASON FOR OVERTIME" (this field it's also vulnerable to format string vulnerability, so with an input like %016llX,%016llX,%016llX etc... will be possible to dump the stack and the canary value)

Any of you that can give it a look? Thanks a lot guys!

(the vulnerable binary it's "vulnelf")


Edited by cjack (see edit history)
  • Like 1

Share this post

Link to post

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  
  • Create New...