The Pentesters: 64-Bit AppSec Primer
Description
The challenges consist of varying vulnerabilities and anti-debugger tricks in binaries, such as:
- Stack-based Buffer Overflows
- Format String Vulnerabilities
- Heap-based Buffer Overflows
- Detection of tracing
- Insecure validation of credentials
- and more… don’t want to give you all the good details eh?
SSH access :
- User: n00b
- Password: n00b
Note: ASLR must be disabled, log in as level17:madpwnage, and run “echo 0 > /proc/sys/kernel/randomize_va_space”. Also, challenge 3, is only a DoS challenge. This is the beta, so there are still glitches.
Full description : https://www.vulnhub.com/entry/the-pentesters-64-bit-appsec-primer-beta,155/
Temps de compromission
4 heures
Système d'exploitation
linux
démarrer cet environnement virtuelRésultats du CTF alltheday pour The Pentesters: 64-Bit AppSec Primer
Pseudonyme | Environnement Virtuel | Nombre d'attaquant | Date de début | Environnement compromis en |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 2019年1月2日 to 01:39 | - |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 2018年12月9日 to 00:07 | - |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 2018年4月23日 to 22:19 | - |
- | The Pentesters: 64-Bit AppSec Primer | 0 | 2018年4月10日 to 13:39 | - |
- | The Pentesters: 64-Bit AppSec Primer | 1 | 2018年3月29日 to 06:33 | - |