The Pentesters: 64-Bit AppSec Primer

Date

Validations

3 Compromissions 4%

Note  Notation

1 Vote

Description

The challenges consist of varying vulnerabilities and anti-debugger tricks in binaries, such as:

  • Stack-based Buffer Overflows
  • Format String Vulnerabilities
  • Heap-based Buffer Overflows
  • Detection of tracing
  • Insecure validation of credentials
  • and more… don’t want to give you all the good details eh?

SSH access :

  • User: n00b
  • Password: n00b

Note: ASLR must be disabled, log in as level17:madpwnage, and run “echo 0 > /proc/sys/kernel/randomize_va_space”. Also, challenge 3, is only a DoS challenge. This is the beta, so there are still glitches.

Full description : https://www.vulnhub.com/entry/the-pentesters-64-bit-appsec-primer-beta,155/

Compromission time

4 hours

Operating system

 linux

start this virtual environnement

CTF Results CTF Results for The Pentesters: 64-Bit AppSec Primer

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- The Pentesters: 64-Bit AppSec Primer 1 2 January 2019 at 01:39 -
- The Pentesters: 64-Bit AppSec Primer 1 9 December 2018 at 00:07 -
- The Pentesters: 64-Bit AppSec Primer 1 23 April 2018 at 22:19 -
- The Pentesters: 64-Bit AppSec Primer 0 10 April 2018 at 13:39 -
- The Pentesters: 64-Bit AppSec Primer 1 29 March 2018 at 06:33 -