4 | Binaries, or executables, are machine code for a computer to execute. For the most part, the binaries that you will face in CTFs are Linux ELF files or the occasional windows executable. Binary Exploitation is a broad topic within Cyber Security which really comes down to finding a vulnerability in the program and exploiting it to gain control of a shell or modifying the program's functions. 5 |
6 | 7 | ## Solved Challenges List 8 | 9 | 1. [Blackbox](./Blackbox/README.md) 10 | 2. [Favorite Color](./Favorite%20Color/README.md) 11 | 3. [Jenny](./Jenny/README.md) 12 | 4. [Lazy Game Challenge](./Lazy%20Game%20Challenge/README.md) 13 | 5. [RIP my bof](./RIP%20my%20bof/README.md) 14 | 6. [Simple bof](./Simple%20bof/README.md) 15 | -------------------------------------------------------------------------------- /Binary/RIP my bof/README.md: -------------------------------------------------------------------------------- 1 | ## RIP my bof 2 | The main idea of finding the flag is Buffer Overflow. 3 | 4 | #### Step-1: 5 | I checked out this writeup to get the flag and understand the method of solving. 6 | 7 | https://n00bmaster.me/posts/CTFLearn_Easy_Pwn/ 8 | 9 | #### Step-2: 10 | Finally, the flag becomes: 11 | `CTFlearn{c0ntr0ling_r1p_1s_n0t_t00_h4rd_abjkdlfa}` -------------------------------------------------------------------------------- /Binary/RIP my bof/pwn-simple-rip/bof2.c: -------------------------------------------------------------------------------- 1 | #include