PowerBI Data Analyst - Create visualizations and dashboards from scratch
Save 40% on 3 months of Coursera Plus
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to exploit a format string vulnerability in this 19-minute video walkthrough of the "Floor Mat Store" binary exploitation challenge from INTIGRITI's 1337UP LIVE CTF 2023. Follow along with a step-by-step demonstration covering basic file analysis, functionality exploration, vulnerability identification, and exploitation using PwnTools and Ghidra. Discover how to leverage printf vulnerabilities to leak sensitive information, with detailed explanations geared toward beginners in binary exploitation. Gain practical experience with CTF tools and techniques while working through a themed challenge that combines educational value with engaging content. Complete with source code review and comprehensive resources for further learning in binary exploitation, bug bounty hunting, and CTF competitions.
Syllabus
Start
Basic file checks
Explore functionality
Identify format string vulnerability
PwnTools script
Disassemble with Ghidra
Leak flag
Challenge source code
End
Taught by
CryptoCat