TL;ND : This blog includes the usage of these features: Details: Well, practice is the best learning. Start my task in a simple coding task (in fact, it is one of my homework questions), here is the question: Across the broad range of the multiverse, there are an infinite number of universes! These universes howeverContinue reading “First day in Rust language”
Category Archives: Uncategorized
shell code learning
There is simply so much to know about this one, I’ve spent a week on it. I am now like a drowning child on the verge of drowning in a sea of knowledge! Here is some simple knoweldge I learn from shellcode: I have collected a few common types of Shellcode below, mainly for learningContinue reading “shell code learning”
narnia2 (shell code)
Username: narnia1Password: iedaedaessh narnia1@narnia.labs.overthewire.org -p 2226 source code like that: emmm…… That’s the first time I get in touch with ‘shell code’, I want more knoweldge about it. It worse a new blog.
Buffer overflow deep study
This is from a Wednesday class on a particular day, and I thought it was detailed enough before, but obviously it wasn’t enough, and I did some studying on my own! A buffer overflow is an anomaly that causes neighbouring memory locations to be overwritten when software writes data into a buffer that overflows theContinue reading “Buffer overflow deep study”
Narnia 0 (buffer overflow)
Classical, very classical. Here is the source code: narnia0: narnia0note: ls -ahleaa6AjYMBBperl -e ‘print “A”x20 . “\xef\xbe\xad\xde” . “B”x4072 . “cat /etc/ narnia_pass/narnia1″‘ | ./narnia0buffer overflow That’s funny, I want know more, but not today XD. Today is K2 VS LNG, I must watch this math!
END!!!!!
Username: natas34Password: shu5ouSuhd4ui5uigae0mohu5ouURL:http://natas34.natas.labs.overthewire.org/
natas 33-34
Username: natas33Password: Ihchno1voinhchisaieem1aingeURL:http://natas33.natas.labs.overthewire.org/ (I change the point colour into blue) Looking at the source code, we know that the server executes the uploaded file when its MD5 checksum matches adeafbadbabec0dedabada55ba55d00d. It’s easy to think of an MD5 collision, however it’s useless here because it’s limited to 4096 bytes. Looking at the front-end code, you’ll seeContinue reading “natas 33-34”
red point error
Now I finally know why there’s a red dot every time I take a screenshot. I used windowszidaide screenshot and after framing the screenshot I used ctrl C + ctrl V to copy it to the blog. The problem is that the ctrl key is the default annotation key. Whenever I use the ctrl key,Continue reading “red point error”
natas 27-28 mysql overflow
This level is very difficult, especially for me who doesn’t know MySQL, so I checked some information online. Username: natas27Password: N9PVzCpPZuDPVzCJ5b3BnbG6OzCJ5bURL:http://natas27.natas.labs.overthewire.org/ Checking the source code, I was trying to get the password through sql injection, but it’s hard to achieve:Firstly, the source code escapes the special characters in the input username and password with theContinue reading “natas 27-28 mysql overflow”
natas Level 24-25 strcmap()
The function is broken…. Very interesting. Username: natas24Password: OsRxSpoAduo98564TZX14z379LZvegURL:http://natas24.natas.labs.overthewire.org/ source code: The strcmp() function exists, strcmp() function’s role is to compare two strings, the same as 0. This naturally thought of strcmp vulnerability, strcmp function can not compare arrays, it will return 0, the passwd input as an array can be bypassed! Extension – strcmpContinue reading “natas Level 24-25 strcmap()”
