kazmatw.github.io's People
kazmatw.github.io's Issues
LJP Reverse1 main1 Writeup - kazma's blog
https://kazma.tw/2023/12/10/LJP-Reverse1-main1-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
LJP Reverse1 baby Writeup - kazma's blog
https://kazma.tw/2023/12/03/LJP-Reverse1-Writeups/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Pwnctf echo_server Writeup - kazma's blog
https://kazma.tw/2023/12/18/Pwnctf-echo-server-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Pwnctf fmtstr Writeup - kazma's blog
https://kazma.tw/2024/01/10/Pwnctf-fmtstr-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Pwnctf ret2sc Writeup - kazma's blog
https://kazma.tw/2023/12/20/Pwnctf-ret2sc-Writeup/
Pwnable.tw - startDescriptionJust a start. Sourcehttps://pwnable.tw/challenge/#1 0x1 Initial Reconnaissance首先觀察這題的一些基本資訊可以發現這題是 x86 的 binary,然後保護機制都沒開。沒有 main ,代表很有可能是直接用組語手刻的。gdb 反組譯 _start 之後也會發現指令
HITCON-CTF-2023 Full Chain - The Blade Writeup - kazma's blog
https://kazma.tw/2024/02/19/HITCON-CTF-2023-Full-Chain-The-Blade-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Pwnable.tw hacknote Writeup - kazma's blog
https://kazma.tw/2024/04/20/Pwnable-tw-hacknote-Writeup/
Pwnable.tw - hacknoteDescription A good Hacker should always take good notes! Sourcehttps://pwnable.tw/challenge/#5 0x1 Initial Reconnaissance常見的 heap 選單題。 file12└─$ file hacknotehacknote: ELF 32-bi
Yuawn Pwn1 casino Writeup - kazma's blog
https://kazma.tw/2023/12/13/Yuawn-Pwn1-casino-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Pwnctf pwntools Writeup - kazma's blog
https://kazma.tw/2023/12/20/Pwnctf-pwntools-Writeup/
Pwnable.tw - startDescriptionJust a start. Sourcehttps://pwnable.tw/challenge/#1 0x1 Initial Reconnaissance首先觀察這題的一些基本資訊可以發現這題是 x86 的 binary,然後保護機制都沒開。沒有 main ,代表很有可能是直接用組語手刻的。gdb 反組譯 _start 之後也會發現指令
Pwnctf luck Writeup - kazma's blog
https://kazma.tw/2023/12/18/Pwnctf-luck-Writeup/
Pwnable.tw - startDescriptionJust a start. Sourcehttps://pwnable.tw/challenge/#1 0x1 Initial Reconnaissance首先觀察這題的一些基本資訊可以發現這題是 x86 的 binary,然後保護機制都沒開。沒有 main ,代表很有可能是直接用組語手刻的。gdb 反組譯 _start 之後也會發現指令
Pwnctf binary Writeup - kazma's blog
https://kazma.tw/2023/12/21/Pwnctf-binary-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Yuawn Pwn1 orw Writeup - kazma's blog
https://kazma.tw/2023/12/10/Yuawn-Pwn1-orw-Writeup/
rop雖然有附 source,但我們假裝沒有 XD。來用 r2 看一下 main: 看到一個 0x30 的 buffer,用 gets 去讀,那我們就 rop 開一個 shell。用以下的指令來搜集需要的 gadget: 12ROPgadget --binary ./rop --only "pop|ret" | lessROPgadget --binary ./rop --o
Pwnctf pass Writeup - kazma's blog
https://kazma.tw/2023/12/20/Pwnctf-pass-Writeup/
Pwnable.tw - startDescriptionJust a start. Sourcehttps://pwnable.tw/challenge/#1 0x1 Initial Reconnaissance首先觀察這題的一些基本資訊可以發現這題是 x86 的 binary,然後保護機制都沒開。沒有 main ,代表很有可能是直接用組語手刻的。gdb 反組譯 _start 之後也會發現指令
Yuawn Pwn2 ret2libc Writeup - kazma's blog
https://kazma.tw/2023/12/18/Yuawn-Pwn2-ret2libc-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
LYS Rop lab_rop1 Writeup - kazma's blog
https://kazma.tw/2023/12/12/LYS-Rop-lab-rop1-Writeup/
rop雖然有附 source,但我們假裝沒有 XD。來用 r2 看一下 main: 看到一個 0x30 的 buffer,用 gets 去讀,那我們就 rop 開一個 shell。用以下的指令來搜集需要的 gadget: 12ROPgadget --binary ./rop --only "pop|ret" | lessROPgadget --binary ./rop --o
Pwnctf ret2src Writeup - kazma's blog
https://kazma.tw/2024/01/09/Pwnctf-ret2src-Writeup/
Pwnable.tw - startDescriptionJust a start. Sourcehttps://pwnable.tw/challenge/#1 0x1 Initial Reconnaissance首先觀察這題的一些基本資訊可以發現這題是 x86 的 binary,然後保護機制都沒開。沒有 main ,代表很有可能是直接用組語手刻的。gdb 反組譯 _start 之後也會發現指令
Pwnable.tw calc Writeup - kazma's blog
https://kazma.tw/2024/02/11/Pwnable-tw-calc-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Patchelf & Glibc-all-in-one Combo - kazma's blog
https://kazma.tw/2024/04/19/Patchelf-Glibc-all-in-one-Combo/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Pwnctf bofe4sy Writeup - kazma's blog
https://kazma.tw/2023/12/20/Pwnctf-bofe4sy-Writeup/
Pwnable.tw - startDescriptionJust a start. Sourcehttps://pwnable.tw/challenge/#1 0x1 Initial Reconnaissance首先觀察這題的一些基本資訊可以發現這題是 x86 的 binary,然後保護機制都沒開。沒有 main ,代表很有可能是直接用組語手刻的。gdb 反組譯 _start 之後也會發現指令
Pwnctf oob1 Writeup - kazma's blog
https://kazma.tw/2024/01/17/Pwnctf-oob1-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Yuawn Pwn1 bof Writeup - kazma's blog
https://kazma.tw/2023/12/10/Yuawn-Pwn1-bof-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Pwnable.tw orw Writeup - kazma's blog
https://kazma.tw/2024/02/07/Pwnable-tw-orw-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Notes for Pwn - kazma's blog
https://kazma.tw/2024/02/11/Note-for-Pwn/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Yuawn Pwn2 rop Writeup - kazma's blog
https://kazma.tw/2023/12/12/Yuawn-Pwn2-rop-Writeup/?
rop雖然有附 source,但我們假裝沒有 XD。來用 r2 看一下 main: 看到一個 0x30 的 buffer,用 gets 去讀,那我們就 rop 開一個 shell。用以下的指令來搜集需要的 gadget: 12ROPgadget --binary ./rop --only "pop|ret" | lessROPgadget --binary ./rop --o
Pwnctf gohome Writeup - kazma's blog
https://kazma.tw/2023/12/20/Pwnctf-gohome-Writeup/
Pwnable.tw - startDescriptionJust a start. Sourcehttps://pwnable.tw/challenge/#1 0x1 Initial Reconnaissance首先觀察這題的一些基本資訊可以發現這題是 x86 的 binary,然後保護機制都沒開。沒有 main ,代表很有可能是直接用組語手刻的。gdb 反組譯 _start 之後也會發現指令
Pwnctf secret Writeup - kazma's blog
https://kazma.tw/2024/01/09/Pwnctf-secret-Writeup/
Pwnable.tw - startDescriptionJust a start. Sourcehttps://pwnable.tw/challenge/#1 0x1 Initial Reconnaissance首先觀察這題的一些基本資訊可以發現這題是 x86 的 binary,然後保護機制都沒開。沒有 main ,代表很有可能是直接用組語手刻的。gdb 反組譯 _start 之後也會發現指令
Pwnctf return Writeup - kazma's blog
https://kazma.tw/2023/12/21/Pwnctf-return-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Pwnable.tw start Writeup - kazma's blog
https://kazma.tw/2024/02/07/Pwnable-tw-start-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Pwnable.tw dubblesort Writeup - kazma's blog
https://kazma.tw/2024/04/19/Pwnable-tw-dubblesort-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Yuawn Pwn2 ret2plt Writeup - kazma's blog
https://kazma.tw/2023/12/17/Yuawn-Pwn2-ret2plt-Writeup/
bofOverview附上這題的 source: 1234567891011121314151617181920#include<stdio.h>#include<stdlib.h>void try_to_call_me(){ system("sh");}int main(){ setvbuf(stdout,0,
Pwnctf oob4 Writeup - kazma's blog
https://kazma.tw/2024/02/06/Pwnctf-oob4-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Pwnctf registration Writeup - kazma's blog
https://kazma.tw/2023/12/21/Pwnctf-registration-Writeup/
kazma's personal space to dive deep into programming, cybersecurity challenges, CTF experiences, and insights from NCKU. Join me on my journey through the digital realm.
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.