The Pentesters: 64-Bit AppSec Primer
Описание
The challenges consist of varying vulnerabilities and anti-debugger tricks in binaries, such as:
- Stack-based Buffer Overflows
- Format String Vulnerabilities
- Heap-based Buffer Overflows
- Detection of tracing
- Insecure validation of credentials
- and more… don’t want to give you all the good details eh?
SSH access :
- User: n00b
- Password: n00b
Note: ASLR must be disabled, log in as level17:madpwnage, and run “echo 0 > /proc/sys/kernel/randomize_va_space”. Also, challenge 3, is only a DoS challenge. This is the beta, so there are still glitches.
Full description : https://www.vulnhub.com/entry/the-pentesters-64-bit-appsec-primer-beta,155/
Время компромисса
4 часы
Операционная система
linux
запустить эту виртуальную средурезультаты CTF за весь период для The Pentesters: 64-Bit AppSec Primer
Псевдоним | Виртуальное окружение | Количество злоумышленников | Дата начала | Окружающая среда в опасности |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 2 Январь 2019 to 01:39 | - |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 9 Декабрь 2018 to 00:07 | - |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 23 Апрель 2018 to 22:19 | - |
- | The Pentesters: 64-Bit AppSec Primer | 0 | 10 Апрель 2018 to 13:39 | - |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 29 Март 2018 to 06:33 | - |