<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Friday-Gems on Shivasurya</title><link>http://shivasurya.me/categories/friday-gems/</link><description>Recent content in Friday-Gems on Shivasurya</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 06 May 2023 00:00:00 +0000</lastBuildDate><atom:link href="http://shivasurya.me/categories/friday-gems/feed.xml" rel="self" type="application/rss+xml"/><item><title>Heap Two Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/05/06/exploit-education-heap-two-exercise-writeup/</link><pubDate>Sat, 06 May 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/05/06/exploit-education-heap-two-exercise-writeup/</guid><description>&lt;p>If you haven&amp;rsquo;t set up your lab yet, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p>
&lt;p>Previous Writeup:&lt;/p>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/28/exploit-education-stack-four-exercise-writeup.html">Stack Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/04/exploit-education-stack-five-exercise-writeup.html">Stack Five Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/26/exploit-education-stack-six-exercise-writeup.html">Stack Six Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/10/exploit-education-format-zero-exercise-writeup.html">Format Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/31/exploit-education-format-one-exercise-writeup.html">Format One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/07/exploit-education-format-two-exercise-writeup.html">Format Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/14/exploit-education-format-three-exercise-writeup.html">Format Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/21/exploit-education-format-four-exercise-writeup.html">Format Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/28/exploit-education-format-heap-exercise-writeup.html">Heap Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/05/05/exploit-education-heap-one-exercise-writeup.html">Heap One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>Similar to Heap One, Heap Two exercise motive is to leverage buffer overflow and perform UAF (&lt;strong>User-After-Free Vulnerability&lt;/strong>) that technically allows to re-use the allocated memory in the heap to control the program flow. Similar to &lt;code>gets&lt;/code> in Heap Zero, &lt;code>strdup&lt;/code> function is unsafe that doesn&amp;rsquo;t have bounds check, it accepts memory address to copy but doesn&amp;rsquo;t care about overwriting other declared struct variable in the heap region.&lt;/p></description></item><item><title>Heap One Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/05/05/exploit-education-heap-one-exercise-writeup/</link><pubDate>Fri, 05 May 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/05/05/exploit-education-heap-one-exercise-writeup/</guid><description>&lt;p>If you haven&amp;rsquo;t set up your lab yet, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p>
&lt;p>Previous Writeup:&lt;/p>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/28/exploit-education-stack-four-exercise-writeup.html">Stack Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/04/exploit-education-stack-five-exercise-writeup.html">Stack Five Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/26/exploit-education-stack-six-exercise-writeup.html">Stack Six Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/10/exploit-education-format-zero-exercise-writeup.html">Format Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/31/exploit-education-format-one-exercise-writeup.html">Format One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/07/exploit-education-format-two-exercise-writeup.html">Format Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/14/exploit-education-format-three-exercise-writeup.html">Format Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/21/exploit-education-format-four-exercise-writeup.html">Format Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/28/exploit-education-format-heap-exercise-writeup.html">Heap Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>Similar to Heap Zero, Heap One exercise motive is to smash the heap to modify other variables in the heap to a &lt;code>hex value&lt;/code> and technically overwrite &lt;code>struct&lt;/code> in the heap. Similar to &lt;code>gets&lt;/code> in Stack Zero, &lt;code>strcpy&lt;/code> function is unsafe that doesn&amp;rsquo;t have bounds check, it accepts memory address to write but doesn&amp;rsquo;t care about overwriting other declared struct variable in the heap region.&lt;/p></description></item><item><title>Heap Zero Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/04/28/exploit-education-format-heap-exercise-writeup/</link><pubDate>Fri, 28 Apr 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/04/28/exploit-education-format-heap-exercise-writeup/</guid><description>&lt;p>If you haven&amp;rsquo;t set up your lab yet, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p>
&lt;p>Previous Writeup:&lt;/p>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/28/exploit-education-stack-four-exercise-writeup.html">Stack Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/04/exploit-education-stack-five-exercise-writeup.html">Stack Five Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/26/exploit-education-stack-six-exercise-writeup.html">Stack Six Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/10/exploit-education-format-zero-exercise-writeup.html">Format Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/31/exploit-education-format-one-exercise-writeup.html">Format One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/07/exploit-education-format-two-exercise-writeup.html">Format Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/14/exploit-education-format-three-exercise-writeup.html">Format Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/21/exploit-education-format-four-exercise-writeup.html">Format Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>Similar to Stack One, Heap Zero exercise motive is to smash the heap to modify other variables in the heap to a &lt;code>hex value&lt;/code> and technically overwrite &lt;code>function pointer&lt;/code> in the heap. Similar to &lt;code>gets&lt;/code> in Stack Zero, &lt;code>strcpy&lt;/code> function is unsafe that doesn&amp;rsquo;t have bounds check, it accepts memory address to write but doesn&amp;rsquo;t care about overwriting other declared function pointer in heap.&lt;/p></description></item><item><title>Format Four Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/04/21/exploit-education-format-four-exercise-writeup/</link><pubDate>Fri, 21 Apr 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/04/21/exploit-education-format-four-exercise-writeup/</guid><description>&lt;h2 id="previous-writeup">Previous Writeup:&lt;/h2>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/28/exploit-education-stack-four-exercise-writeup.html">Stack Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/04/exploit-education-stack-five-exercise-writeup.html">Stack Five Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/26/exploit-education-stack-six-exercise-writeup.html">Stack Six Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/10/exploit-education-format-zero-exercise-writeup.html">Format Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/31/exploit-education-format-one-exercise-writeup.html">Format One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/07/exploit-education-format-two-exercise-writeup.html">Format Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/04/14/exploit-education-format-three-exercise-writeup.html">Format Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;p>If you haven&amp;rsquo;t done setting-up your lab, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p></description></item><item><title>Format Three Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/04/14/exploit-education-format-three-exercise-writeup/</link><pubDate>Fri, 14 Apr 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/04/14/exploit-education-format-three-exercise-writeup/</guid><description>&lt;h2 id="previous-writeup">Previous Writeup:&lt;/h2>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/28/exploit-education-stack-four-exercise-writeup.html">Stack Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/04/exploit-education-stack-five-exercise-writeup.html">Stack Five Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/26/exploit-education-stack-six-exercise-writeup.html">Stack Six Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/10/exploit-education-format-zero-exercise-writeup.html">Format Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/31/exploit-education-format-one-exercise-writeup.html">Format One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/31/exploit-education-format-one-exercise-writeup.html">Format Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;p>If you haven&amp;rsquo;t done setting-up your lab, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p></description></item><item><title>Format Two Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/04/07/exploit-education-format-two-exercise-writeup/</link><pubDate>Fri, 07 Apr 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/04/07/exploit-education-format-two-exercise-writeup/</guid><description>&lt;h2 id="previous-writeup">Previous Writeup:&lt;/h2>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/28/exploit-education-stack-four-exercise-writeup.html">Stack Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/04/exploit-education-stack-five-exercise-writeup.html">Stack Five Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/26/exploit-education-stack-six-exercise-writeup.html">Stack Six Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/10/exploit-education-format-zero-exercise-writeup.html">Format Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/31/exploit-education-format-one-exercise-writeup.html">Format One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;p>If you haven&amp;rsquo;t done setting-up your lab, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p></description></item><item><title>Format One Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/03/31/exploit-education-format-one-exercise-writeup/</link><pubDate>Fri, 31 Mar 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/03/31/exploit-education-format-one-exercise-writeup/</guid><description>&lt;h2 id="previous-writeup">Previous Writeup:&lt;/h2>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/28/exploit-education-stack-four-exercise-writeup.html">Stack Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/04/exploit-education-stack-five-exercise-writeup.html">Stack Five Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/26/exploit-education-stack-six-exercise-writeup.html">Stack Six Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/03/10/exploit-education-format-zero-exercise-writeup.html">Format Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;p>If you haven&amp;rsquo;t done setting-up your lab, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p></description></item><item><title>HackTheBox Active Writeup - Active Directory - OSCP Practice</title><link>http://shivasurya.me/2023/03/17/hackthebox-active-writeup-oscp-active-directory/</link><pubDate>Fri, 17 Mar 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/03/17/hackthebox-active-writeup-oscp-active-directory/</guid><description>&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>&lt;a href="https://app.hackthebox.com/machines/Active">Active&lt;/a> is one of the easy Active Directory focused Windows Box from &lt;a href="https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#">TJNull OSCP Practice list&lt;/a>. It&amp;rsquo;s one of those easy machine where you get initial foothold via SMB &lt;code>Replication&lt;/code> share leak &amp;amp; escalate privileges using Active Directory weakness.&lt;/p>
&lt;p>&lt;img src="http://shivasurya.me/assets/media/htb-active-logo.png" alt="Active VM - HacktheBox Logo">&lt;/p>
&lt;h3 id="enumeration">Enumeration&lt;/h3>
&lt;h4 id="nmapautomator">NMapAutomator&lt;/h4>
&lt;p>Started with enumerating the target with &lt;a href="https://github.com/21y4d/nmapAutomator">&lt;code>NMapAutomator&lt;/code>&lt;/a> script since it helps in automating all possible ports with vulnerability scripts from &lt;code>nmap&lt;/code>. Additionally, &lt;code>NmapAutomator&lt;/code> can help in recon process using &lt;code>smbmap&lt;/code>, &lt;code>ffuf&lt;/code>, &lt;code>nikto&lt;/code>, &lt;code>DNSRecon&lt;/code>, &lt;code>SMB&lt;/code> enumeration.&lt;/p></description></item><item><title>Format Zero Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/03/10/exploit-education-format-zero-exercise-writeup/</link><pubDate>Fri, 10 Mar 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/03/10/exploit-education-format-zero-exercise-writeup/</guid><description>&lt;h3 id="previous-writeup">Previous Writeup:&lt;/h3>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/28/exploit-education-stack-four-exercise-writeup.html">Stack Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/04/exploit-education-stack-five-exercise-writeup.html">Stack Five Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/26/exploit-education-stack-six-exercise-writeup.html">Stack Six Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;p>If you haven&amp;rsquo;t done setting-up your lab, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p></description></item><item><title>Stack Six Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/02/26/exploit-education-stack-six-exercise-writeup/</link><pubDate>Sun, 26 Feb 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/02/26/exploit-education-stack-six-exercise-writeup/</guid><description>&lt;h3 id="previous-writeup">Previous Writeup:&lt;/h3>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/28/exploit-education-stack-four-exercise-writeup.html">Stack Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/02/04/exploit-education-stack-five-exercise-writeup.html">Stack Five Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;p>If you&amp;rsquo;re learning and writing binary exploits, I would strongly recommend you to take &lt;a href="https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/course/">Architecture 1001: x86-64 Assembly&lt;/a> course by &lt;code>Xeno Kovah&lt;/code>. They cover a wide variety of learning assembly instructions which will be really helpful to understand the exploits.&lt;/p></description></item><item><title>Stack Five Writeup (Code Execution) - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/02/04/exploit-education-stack-five-exercise-writeup/</link><pubDate>Sat, 04 Feb 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/02/04/exploit-education-stack-five-exercise-writeup/</guid><description>&lt;h3 id="previous-writeup">Previous Writeup:&lt;/h3>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/28/exploit-education-stack-four-exercise-writeup.html">Stack Four Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;p>If you&amp;rsquo;re learning and writing binary exploits, I would strongly recommend you to take &lt;a href="https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/course/">Architecture 1001: x86-64 Assembly&lt;/a> course by &lt;code>Xeno Kovah&lt;/code>. They cover a wide variety of learning assembly instructions which will be really helpful to understand the exploits.&lt;/p></description></item><item><title>Stack Four Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/01/28/exploit-education-stack-four-exercise-writeup/</link><pubDate>Sat, 28 Jan 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/01/28/exploit-education-stack-four-exercise-writeup/</guid><description>&lt;h3 id="previous-writeup">Previous Writeup:&lt;/h3>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/27/exploit-education-stack-three-exercise-writeup.html">Stack Three Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;p>If you&amp;rsquo;re learning and writing binary exploits, I would strongly recommend you to take &lt;a href="https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/course/">Architecture 1001: x86-64 Assembly&lt;/a> course by &lt;code>Xeno Kovah&lt;/code>. They cover a wide variety of learning assembly instructions which will be really helpful to understand the exploits.&lt;/p></description></item><item><title>Stack Three Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/01/27/exploit-education-stack-three-exercise-writeup/</link><pubDate>Fri, 27 Jan 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/01/27/exploit-education-stack-three-exercise-writeup/</guid><description>&lt;p>If you&amp;rsquo;re learning and writing binary exploits, I would strongly recommend you to take &lt;a href="https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/course/">Architecture 1001: x86-64 Assembly&lt;/a> course by &lt;code>Xeno Kovah&lt;/code>. They cover a wide variety of learning assembly instructions which will be really helpful to understand the exploits.&lt;/p>
&lt;p>If you haven&amp;rsquo;t done setting-up your lab, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p>
&lt;p>Previous Writeup:&lt;/p>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/26/exploit-education-stack-two-exercise-writeup.html">Stack Two Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>Similar to Stack Two, Stack Three exercise motive is to smash the stack to modify other variables in the stack to a &lt;code>hex value&lt;/code> and technically overwrite &lt;code>function pointer&lt;/code> in the stack. Similar to &lt;code>gets&lt;/code> in Stack Zero, &lt;code>strcpy&lt;/code> function is unsafe that doesn&amp;rsquo;t have bounds check, it accepts memory address to write but doesn&amp;rsquo;t care about overwriting other declared function pointer in stack. If you take closer look at the struct which isn&amp;rsquo;t dynamically being allocated by &lt;code>malloc&lt;/code> function, so probably the struct which contains both &lt;code>char buffer[64]&lt;/code> and &lt;code>volatile int *fp&lt;/code> function pointer stays in main stackframe. This overwritten function pointer will be further used to invoke in later part of the program.&lt;/p></description></item><item><title>Stack Two Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/01/26/exploit-education-stack-two-exercise-writeup/</link><pubDate>Thu, 26 Jan 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/01/26/exploit-education-stack-two-exercise-writeup/</guid><description>&lt;p>If you&amp;rsquo;re learning and writing binary exploits, I would strongly recommend you to take &lt;a href="https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/course/">Architecture 1001: x86-64 Assembly&lt;/a> course by &lt;code>Xeno Kovah&lt;/code>. They cover a wide variety of learning assembly instructions which will be really helpful to understand the exploits.&lt;/p>
&lt;p>If you haven&amp;rsquo;t done setting-up your lab, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p>
&lt;p>Previous Writeup:&lt;/p>
&lt;ol>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/20/exploit-education-stack-one-exercise-writeup.html">Stack One Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/li>
&lt;/ol>
&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>Similar to Stack One, Stack Two exercise motive is to smash the stack to modify other variables in the stack to a &lt;code>hex value 0x0d0a090a&lt;/code> but receives the value from the environment variable &lt;code>ExploitEducation&lt;/code>. Technically, similar to &lt;code>gets&lt;/code> in Stack Zero, &lt;code>strcpy&lt;/code> function is unsafe that doesn&amp;rsquo;t have bounds check, it accepts memory address to write but doesn&amp;rsquo;t care about overwriting other declared variables in stack. If you take closer look at the struct which isn&amp;rsquo;t dynamically being allocated by &lt;code>malloc&lt;/code> function, so probably the struct which contains both &lt;code>char buffer[64]&lt;/code> and &lt;code>volatile int changeme&lt;/code> stays in main stackframe.&lt;/p></description></item><item><title>Stack One Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/01/20/exploit-education-stack-one-exercise-writeup/</link><pubDate>Fri, 20 Jan 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/01/20/exploit-education-stack-one-exercise-writeup/</guid><description>&lt;p>If you&amp;rsquo;re learning and writing binary exploits, I would strongly recommend you to take &lt;a href="https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/course/">Architecture 1001: x86-64 Assembly&lt;/a> course by &lt;code>Xeno Kovah&lt;/code>. They cover a wide variety of learning assembly instructions which will be really helpful to understand the exploits.&lt;/p>
&lt;p>If you haven&amp;rsquo;t done setting-up your lab, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p>
&lt;p>Previous Writeup: &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/12/exploit-education-stack-zero-exercise-writeup.html">Stack Zero Writeup - Exploit Education Lab Exercise&lt;/a>&lt;/p>
&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>Unlike Stack Zero, Stack One exercise motive is to smash the stack to modify other variables in the stack to a &lt;code>hex value 0x496c5962&lt;/code>. Technically, similar to &lt;code>gets&lt;/code> in Stack Zero, &lt;code>strcpy&lt;/code> function is unsafe that doesn&amp;rsquo;t have bounds check, it accepts memory address to write but doesn&amp;rsquo;t care about overwriting other declared variables in stack. If you take closer look at the struct which isn&amp;rsquo;t dynamically being allocated by &lt;code>malloc&lt;/code> function, so probably the struct which contains both &lt;code>char buffer[64]&lt;/code> and &lt;code>volatile int changeme&lt;/code> stays in main stackframe.&lt;/p></description></item><item><title>Stack Zero Writeup - Exploit Education Lab Exercise</title><link>http://shivasurya.me/2023/01/12/exploit-education-stack-zero-exercise-writeup/</link><pubDate>Thu, 12 Jan 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/01/12/exploit-education-stack-zero-exercise-writeup/</guid><description>&lt;p>If you&amp;rsquo;re learning and writing binary exploits, I would strongly recommend you to take &lt;a href="https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/course/">Architecture 1001: x86-64 Assembly&lt;/a> course by &lt;code>Xeno Kovah&lt;/code>. They cover a wide variety of learning assembly instructions which will be really helpful to understand the exploits.&lt;/p>
&lt;p>If you haven&amp;rsquo;t done setting-up your lab, feel free to check out my previous article on &lt;a href="https://shivasurya.me/security/binary-exploit/reverse-engineering/friday-gems/2023/01/06/exploit-education-lab-setup.html">Exploit.education lab setup&lt;/a>&lt;/p>
&lt;h3 id="quick-overview">Quick Overview&lt;/h3>
&lt;p>Stack Zero exercise is based on stackoverflow memory corruption issue where you&amp;rsquo;ll have to smash the stack to modify other variables in the stack to achieve code execution, execution flow redirection or behaviour in the program. Technically, &lt;code>gets&lt;/code> function is unsafe that doesn&amp;rsquo;t have bounds check basically, it accepts memory address to write but doesn&amp;rsquo;t care about overwriting other declared variables in stack. If you take closer look at the struct which isn&amp;rsquo;t dynamically being allocated by &lt;code>malloc&lt;/code> function, so probably the struct which contains both &lt;code>char buffer[64]&lt;/code> and &lt;code>volatile int changeme&lt;/code> stays in main stackframe.&lt;/p></description></item><item><title>Exploit Education Lab Setup - Windows &amp; MacOS</title><link>http://shivasurya.me/2023/01/06/exploit-education-lab-setup/</link><pubDate>Fri, 06 Jan 2023 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2023/01/06/exploit-education-lab-setup/</guid><description>&lt;p>Exploit.education binary exploitation exercise typically runs on ASLR (Address space layout randomization) disabled ubuntu based virtual machine with Data Execution Prevention turned off binaries. In order to setup the &lt;code>exploit.education&lt;/code> lab, You&amp;rsquo;ll have to either use virtualbox or qemu based virtual machine emulator setup to easily test and debug the exercises.&lt;/p>
&lt;h3 id="installation">Installation&lt;/h3>
&lt;p>For both MacOS and Windows, grab a copy of &lt;a href="https://www.qemu.org/download/">qemu emulator&lt;/a> and follow the installation setup which is quite easy.&lt;/p></description></item></channel></rss>