Overview
Learn how to exploit a classic buffer overflow vulnerability in this video walkthrough of the "Retro2Win" pwn challenge from Intigriti's 1337UP LIVE CTF 2024. Master the process of binary exploitation by following a detailed demonstration that covers essential file checks, binary functionality review, static analysis using Ghidra, and dynamic analysis with GDB. Discover how to identify buffer overflow offsets and develop a proof-of-concept exploit using pwntools, with special attention to parameter handling and register manipulation (RDI/RSI). Progress through practical steps including basic security checks, disassembly analysis, and exploit development while gaining insights into calling win functions with specific parameters. Perfect for those interested in binary exploitation, CTF competitions, and practical cybersecurity skills.
Syllabus
Intro
Basic file checks
Review binary functionality
Disassemble with ghidra static analysis
Identify overflow offset in GDB dynamic analysis
Develop exploit PoC pwntools script
Recap
Conclusion
Taught by
CryptoCat