The Pentesters: 64-Bit AppSec Primer
Description
The challenges consist of varying vulnerabilities and anti-debugger tricks in binaries, such as:
- Stack-based Buffer Overflows
- Format String Vulnerabilities
- Heap-based Buffer Overflows
- Detection of tracing
- Insecure validation of credentials
- and more… don’t want to give you all the good details eh?
SSH access :
- User: n00b
- Password: n00b
Note: ASLR must be disabled, log in as level17:madpwnage, and run “echo 0 > /proc/sys/kernel/randomize_va_space”. Also, challenge 3, is only a DoS challenge. This is the beta, so there are still glitches.
Full description : https://www.vulnhub.com/entry/the-pentesters-64-bit-appsec-primer-beta,155/
Compromission time
4 hours
Operating system
linux
start this virtual environnementCTF Results for The Pentesters: 64-Bit AppSec Primer
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 2 January 2019 at 01:39 | - |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 9 December 2018 at 00:07 | - |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 23 April 2018 at 22:19 | - |
- | The Pentesters: 64-Bit AppSec Primer | 0 | 10 April 2018 at 13:39 | - |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 29 March 2018 at 06:33 | - |