Fusion
After learning the principles of binary exploitation in my Microcorruption series and putting them into real-world practice in the Protostar exercises, we are ready to delve into the Fusion exercises, also presented through exploit-exercises.com. This series of challenges will present us with various exploit mitigation techniques that will need to be defeated.
To get started, you will need the VM from the downloads page. This VM comes with a newer Ubuntu OS as opposed to the Debian we were familiar with in Protostar. I am using VMWare Workstation to run the VM.
Here are my writeups, along with the topics introduced:
0x00 - Level00 - remote stack buffer overflow (refresher)
0x01 - Level01 pt 1 - remote stack buffer overflow with ASLR
To get started, you will need the VM from the downloads page. This VM comes with a newer Ubuntu OS as opposed to the Debian we were familiar with in Protostar. I am using VMWare Workstation to run the VM.
Here are my writeups, along with the topics introduced:
0x00 - Level00 - remote stack buffer overflow (refresher)
0x01 - Level01 pt 1 - remote stack buffer overflow with ASLR