- Confidentiality
- Resources should be protected from unauthorized access
- Prioritized by governments
- Concepts
- Sensitivity
- How harmful is disclosure
- Sensitivity
- Discretion
- Executables
- Linux Native
- Static Analysis
strings
: For listing down displayable textobjdump
: For parsing binariesfile
: For checking architecture of executablereadelf
: For parsing ELF Headerschecksec
: Checks active protection mechanisms for executables
- Static Analysis
- Linux Native
- https://github.com/kholia/checksec
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
choco install -y git python2 vcbuildtools jdk8 swig | |
$baseDir="C:\work\openvpn3lib\dep" | |
Write-Host "Preparing base dir $baseDir" | |
New-Item -Force "$baseDir\deps" -ItemType Directory | |
Set-Location "$baseDir" | |
Write-Host "Downloading dependencies..." | |
git clone https://github.com/OpenVPN/openvpn3.git openvpn3 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
"""This module contains the Transaction object.""" | |
from redis.client import Redis | |
class TransactionException(Exception): | |
"""Thrown when a transaction error is encountered.""" | |
pass |
- netfilterqueue
- scapy
- twisted
- Transforms
- DuckDuckGo
- Instant Answers: determine entity type
- Wikipedia
- Subsidiaries
- Name
- Website
- Products
- Name
- Subsidiaries
- DuckDuckGo
- Website
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* Push "/home/orw/flag" into the stack */ | |
push 0x00006761 | |
push 0x6c662f77 | |
push 0x726f2f65 | |
push 0x6d6f682f | |
/* fd = open("/home/orw/flag", O_RDONLY) */ | |
mov ecx, 0x00 | |
mov ebx, esp | |
mov eax, 0x05 | |
int 0x80 |
- IP
nmap
- Version
- Web Apps
- Version
www.exploit-db.com
- Exploits
www.cvedetails.com
- CVE Details
- Web
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# requires https://github.com/Gallopsled/pwntools | |
import sys | |
if len(sys.argv) != 3: | |
print 'Usage: python pwnable-start.py <host> <port>' | |
print 'Example: python pwnable-start.py chall.pwnable.tw 10000' | |
sys.exit(1) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
* Web Page | |
* Check comments for clues | |
* Check images for embedded files |
NewerOlder