Nicola Gatta

Husband, Father, Cyclist ... and sometimes an IT professional loving Security and Infrastructure

O-S-P-F




By Nicola Gatta - April 23, 2013
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Pages

  • Home page
  • About Me

Contributors

  • Amicofragile
  • Nicola Gatta

Blog Archive

  • ►  2021 (4)
    • ►  May (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2020 (19)
    • ►  September (2)
    • ►  August (7)
    • ►  April (4)
    • ►  March (2)
    • ►  February (3)
    • ►  January (1)
  • ►  2019 (42)
    • ►  November (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (4)
    • ►  June (26)
    • ►  May (8)
    • ►  January (1)
  • ►  2014 (1)
    • ►  March (1)
  • ▼  2013 (2)
    • ▼  April (2)
      • O-S-P-F
      • CCNA Security
  • ►  2012 (2)
    • ►  July (1)
    • ►  May (1)
  • ►  2011 (2)
    • ►  March (1)
    • ►  February (1)
  • ►  2010 (2)
    • ►  March (2)
  • ►  2009 (6)
    • ►  September (1)
    • ►  May (2)
    • ►  April (3)
  • ►  2008 (13)
    • ►  November (2)
    • ►  October (1)
    • ►  September (3)
    • ►  August (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  January (3)
  • ►  2007 (13)
    • ►  August (3)
    • ►  July (2)
    • ►  May (3)
    • ►  April (1)
    • ►  February (4)
  • ►  2006 (2)
    • ►  September (1)
    • ►  July (1)
  • ►  2005 (3)
    • ►  November (3)

Labels

  • Cycling
  • IT Infrastructure
  • Security
  • Varie

Report Abuse

Popular Posts

  • OverTheWire.org - Behemoth - Level 1 Writeup
    No source code, so let's go directly to gdb behemoth1@behemoth:~ $ gdb /behemoth/behemoth1 .... (gdb) disass main Dump of assemble...
  • OverTheWire.org - Maze - Level 0 Writeup
    Let's run the executable in ltrace maze0@maze:/tmp $ ltrace /maze/maze0 __libc_start_main(0x804854b, 1, 0xffffd794, 0x80485e0 <un...
  • OverTheWire.org - Narnia - Level 2 Writeup
    This one is the very classic stack buffer overflow. Let's look at the source code: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16...
  • OverTheWire.org - Narnia - Level 6 Writeup
    The vulnerable code for this level is 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33...
  • OverTheWire.org - Utumno - Level 0 Writeup
    The vulnerable executable /utumno/utumno0 is executable but not readable. With gdb or ltrace or strace there is no way to disassamble or re...
  • OverTheWire.org - Narnia - Level 5 Writeup
    The vulnerable code is: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 #include <stdio.h> #include <stdl...
  • OverTheWire.org - Utumno - Level 1 Writeup
    Let's run the executable utumno1@utumno:~ $ ltrace /utumno/utumno1 __libc_start_main(0x80484a5, 1, 0xffffd794, 0x8048530 <unfinis...
  • OverTheWire.org - Narnia - Level 8 Writeup
    The vulnerable code is: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 #include <stdio.h...
  • OverTheWire.org - Maze - Level 1 Writeup
    Let's run the executable maze1@maze:~ $ /maze/maze1 /maze/maze1: error while loading shared libraries: ./libc.so.4: cannot open share...
  • OverTheWire.org - Maze - Level 4 Writeup
    As in the previous level, let's try to understand what the executable is doing by running it with different parameters and with strace o...
Simple theme. Powered by Blogger.