-
Recent Posts
Categories
Archives
Links
Tag Archives: Reverse Engineering
Blackbox Level 6 – Overflowing File Pointers and Vulnerable fputs
In today’s post, we’re going to be taking a look at level 6 of the Blackbox wargame, provided by the Smash The Stack network. As usual, the final password of the level will be stripped and replaced with Y’s. If … Continue reading
Posted in BlackBox, Smash The Stack, Wargames
Tagged BlackBox, Reverse Engineering, Smash The Stack, Vulnerability Analysis
Leave a comment
IO Level 3 – Function Pointers
Welcome back. Today we’re going to be looking at the IO wargame from Smash The Stack. Specifically, we will be looking at level 3. If you’re interested in following along, go a head and ssh into IO as level3 with … Continue reading
Posted in IO, Smash The Stack, Wargames
Tagged Buffer Overflow, Function Pointers, IO, Reverse Engineering, Smash The Stack, Vulnerability Analysis, Wargames
Leave a comment
BlackBox Level1 – Welcome to the GDB
Welcome. This blog will be about the BlackBox wargame on the SmashTheStack Network. Today we will be starting off the wargame with Level1. Since BlackBox is a more advanced wargame, basic ssh and linux experience will be assumed. Also, the … Continue reading