pwn.college
DojosLeaderboardCommunity
LoginRegister
Back to software-exploitation

Format String Exploits

software-exploitation
0/24 challenges completed

Exploiting format string vulnerabilities is like a locksmith using a special set of tools to subtly manipulate the inner workings of a lock. It involves delicately inserting custom-crafted sequences into a program's output functions, much like a skilled safecracker tuning into the faint clicks of a safe's mechanism. Each carefully chosen character or specifier in the format string acts like a precise tweak to the internal gears, potentially revealing hidden information or granting control over the system's memory. This technique is a blend of art and science, requiring a deep understanding of the software's architecture and a creative approach to bending its functionalities beyond their intended limits. It's a thrilling intellectual puzzle, unlocking the secrets of a program from the inside out.

Format String Exploits: Introduction
Video
Slides
Format String Exploits: Leaking Data
Video
Slides
Format String Exploits: Writing Data
Video
Slides
Autogenerated tips and tricks from the discord channel

Challenges

1
Level1.0
2
Level1.1
3
Level2.0
4
Level2.1
5
Level3.0
6
Level3.1
7
Level4.0
8
Level4.1
9
Level5.0
10
Level5.1
11
Level6.0
12
Level6.1
13
Level7.0
14
Level7.1
15
Level8.0
16
Level8.1
17
Level9.0
18
Level9.1
19
Level10.0
20
Level10.1
21
Level11.0
22
Level11.1
23
Level12.0
24
Level12.1