Throughout the journey I will reference multiple sources and people to gain a better understanding of binary exploitation and reverse engineering at large.

To begin my journey I will go through

https://research.checkpoint.com/wp-content/uploads/2020/03/pwnable_writeup.pdf


I attempted http://microcorruption.com/ but with my current knowledge I can’t even begin to understand what’s going on. I would have to continue on the SLAE course and work more with disassemblers to read the assembly instructions and work with their debugger.

Onto pwnable.kr challenges, challenge 0x02 Bof, a buffer overflow challenge with the source code included to look at.

They initialize key as a variable, initialize a buffer of 32 bits for “overflow me”, prints that statement to console.

They then ask for inputs with gets

(which is a dangerous for memory error if implemented incorrectly, it just seeks input without verifying how much data will fit in the buffer)

Work in progress, continuing tomorrow