Level11 is once more a good challenge to understand the importance of careful designing of SUID programs and the sanitization of all the input, either…
Level11 is once more a good challenge to understand the importance of careful designing of SUID programs and the sanitization of all the input, either…
Level12 shows again the problem of input sanitization, demonstrated on one small Lua program. As usual, let’s try to obtain a shell under flag12 account.…
I sure miss radare2, it’s a fact! So, when I looked at the level13 code and realized that it hidden some token, radare2 was the…
Level14 is a simple challenge, which is why I’ll solve it quickly. You will need knowledge in one programming language if you want to solve…
Until now, level15 was the challenge that took me more time to solve. I was really stuck, because there was a lot of subjects new…
Just like level07, level16 has a Perl script that we need to analyze and has also a vulnerability as expected: input not sanitized. Let’s exploit it. What you’ll…
On level17 we have a python script listening on port 10007. In order to solve this challenge we’ll have to connect to this port and…
On the present challenge, level18, there are three ways of exploiting the program. I’m going to take the easiest one What you’ll need to know……
We reached the last challenge of Nebula exercises, level19. This challenge deals with the basic way on how processes work on Linux systems. What you’ll…
After a few months without using radare2 it’s now time to get back to the write ups. During this time, and as you can see…