hextrace

hextrace @hextrace

About: Writing about software security

Joined:
Apr 6, 2020

hextrace
articles - 16 total

TShark - TryHackMe

This is a quick writeup of the TShark room of tryhackme.com. TShark TShark is a network p...

Learn More 7 0May 7 '21

Investigating Windows 2.0 - TryHackMe

Here is the writeup for the room Investigating Windows 2.0. This room is the continuation of Investi...

Learn More 26 0Mar 10 '21

ARM hacking – shellcode exec

In this exercise we'll hack control flow by rewriting pc, making it point to the hello wold shellcode...

Learn More 6 0Jan 31 '21

ARM shellcode

Lets transform the hello world code we wrote in the previous blog entry into a shellcode. To remove...

Learn More 3 0Jan 30 '21

ARM Assembly – hello world

ARM architecture was originally designed for an Acorn computer and meant Acorn Risc Machine. It has t...

Learn More 5 0Jan 30 '21

ARM – rewrite PC

In this article, we'll rewrite the pc register to take control of the program flow. This can be done...

Learn More 6 0Jan 30 '21

Hack control flow – ARM sBOF

In this episode of the ProtoARM series, we'll exploit a vulnerable program to change the 'normal' con...

Learn More 0 0Jan 30 '21

ARM BoF exploit via pwntools

This is our source code for the third exploit of this series on ARM hacking: #include <stdlib.h...

Learn More 2 0Jan 29 '21

ARM BOF, überwrite stack data

In this second protoarm exercise, we'll exploit a buffer overflow to write arbitary data onto the sta...

Learn More 3 0Jan 28 '21

A simple ARM buffer overflow

Let's get started with binary exploitation on ARM systems. This challenge is based on the 'protostar'...

Learn More 7 0Jan 27 '21

Jump into shellcode (protostar - stack5)

Analysis root@protostar:/opt/protostar/bin# file stack5 stack5: setuid ELF 32-bit LSB e...

Learn More 2 0Jan 10 '21

Rewrite instruction pointer (protostar - stack4)

This is the 5th exercise of the protostar series. This is about exploiting a buffer overflow to rewri...

Learn More 5 0Dec 11 '20

Smashing function pointers with buffer overflow(protostar - stack3)

Protostar - stack3 In this third exercice of our series, we'll modify call flow of the pro...

Learn More 5 0Dec 10 '20

Hacking environment variables (protostar - stack2)

Protostar - stack2 In stack0 our user input came from standard input via the gets function...

Learn More 6 0Dec 8 '20

Validating program arguments (Protostar - stack1)

Last time we discovered how bad can stack overflows be. This presents another way for the user to inj...

Learn More 5 0Dec 6 '20

Stack overflow rules (protostar - stack0)

Let's discover stack-based buffer overflows with the first Protostar challenge: stack0. Here is the...

Learn More 6 1Dec 6 '20