Level11 is once more a good challenge to understand the importance of careful designing of SUID programs and the sanitization of all the input, either … Read more
Level11 is once more a good challenge to understand the importance of careful designing of SUID programs and the sanitization of all the input, either … Read more
Level12 shows again the problem of input sanitization, demonstrated on one small Lua program. As usual, let’s try to obtain a shell under flag12 account. … Read more
I sure miss radare2, it’s a fact! So, when I looked at the level13 code and realized that it hidden some token, radare2 was the … Read more
Level14 is a simple challenge, which is why I’ll solve it quickly. You will need knowledge in one programming language if you want to solve … Read more
Until now, level15 was the challenge that took me more time to solve. I was really stuck, because there was a lot of subjects new … Read more
Just like level07, level16 has a Perl script that we need to analyze and has also a vulnerability as expected: input not sanitized. Let’s exploit it. What you’ll … Read more
On level17 we have a python script listening on port 10007. In order to solve this challenge we’ll have to connect to this port and … Read more
On the present challenge, level18, there are three ways of exploiting the program. I’m going to take the easiest one What you’ll need to know… … Read more
We reached the last challenge of Nebula exercises, level19. This challenge deals with the basic way on how processes work on Linux systems. What you’ll … Read more
After a few months without using radare2 it’s now time to get back to the write ups. During this time, and as you can see … Read more