Protostar – stack2

Information Stack2 looks at environment variables, and how they can be set. This level is at /opt/protostar/bin/stack2 Source code Solution In this challenge again, the vulnerability is located at the line : strcpy(buffer, variable); Instead of the argv[1] value, it is the value of ‘variable’ which is copied in ‘buffer’. ‘variable’ is equal to the ...

Protostar – stack1

Information This level looks at the concept of modifying variables to specific values in the program, and how the variables are laid out in memory. This level is at /opt/protostar/bin/stack1 Hints • If you are unfamiliar with the hexadecimal being displayed, “man ascii” is your friend. • Protostar is little endian Source code Solution The ...

Protostar – stack0

Information This level introduces the concept that memory can be accessed outside of its allocated region, how the stack variables are laid out, and that modifying outside of the allocated memory can modify program execution. This level is at /opt/protostar/bin/stack0 Source code Solution Alright, let’s start this new set of challenges !! After having looked ...