Created from the plain text reference card on orgmode.org Download this file, and open it in Emacs org-mode!
| # Name: Makefile | |
| # Author: <insert your name here> | |
| # Copyright: <insert your copyright message here> | |
| # License: <insert your license reference here> | |
| # DEVICE ....... The AVR device you compile for | |
| # CLOCK ........ Target AVR clock rate in Hertz | |
| # OBJECTS ...... The object files created from your source files. This list is | |
| # usually the same as the list of source files with suffix ".o". | |
| # PROGRAMMER ... Options to avrdude which define the hardware you use for |
This article has been updated and is available here.
In any web browser:
- From the Arduino website, download & install the latest Arduino IDE (v1.8 or later). Available for Windows, Mac, Linux & ARM.
| # use ImageMagick convert | |
| # the order is important. the density argument applies to input.pdf and resize and rotate to output.pdf | |
| convert -density 90 input.pdf -rotate 0.5 -attenuate 0.2 +noise Multiplicative -colorspace Gray output.pdf |
| # source:http://geocities.com/SiliconValley/heights/7052/opcode.txt | |
| From: mark@omnifest.uwm.edu (Mark Hopkins) | |
| Newsgroups: alt.lang.asm | |
| Subject: A Summary of the 80486 Opcodes and Instructions | |
| (1) The 80x86 is an Octal Machine | |
| This is a follow-up and revision of an article posted in alt.lang.asm on | |
| 7-5-92 concerning the 80x86 instruction encoding. | |
| The only proper way to understand 80x86 coding is to realize that ALL 80x86 |
In this write-up I will discuss how I managed to solve the challenge "babystack" from 0ctf with a technique called return to dl-resolve. I did not know this kind of return-to attack before the contest. In the following sections a detailed explanation of the entire exploit will be presented.
I downloaded the provided binary babystack and quickly fired up binaryninja alongside with gdb to analyze it. I quickly realized a buffer overflow vulnerability is present within sub_804843b.
My first approach was to solve this challenge using a return-to-libc attack by leaking the base address of the library and call system in order to get a shell.
This technique is contingent on:
- Leaking libc base address
- Knowing the version of libc to get the offset of
system.
However, the version of libc on the remote server was unknown and the ELF did not provide any function that can be us
A complete list of books, articles, blog posts, videos and neat pages that support Data Fundamentals (H), organised by Unit.
If the resource is available online (legally) I have included a link to it. Each entry has symbols following it.
- ⨕⨕⨕ indicates difficulty/depth, from ⨕ (easy to pick up intro, no background required) through ⨕⨕⨕⨕⨕ (graduate level textbook, maths heavy, expect equations)
- ⭐ indicates a particularly recommended resource; 🌟 is a very strongly recommended resource and you should look at it.
