Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Format String Vulnerability Tutorial - Binary Exploitation Challenge

CryptoCat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to exploit a format string vulnerability in this 19-minute video walkthrough of the "Floor Mat Store" binary exploitation challenge from INTIGRITI's 1337UP LIVE CTF 2023. Follow along with a step-by-step demonstration covering basic file analysis, functionality exploration, vulnerability identification, and exploitation using PwnTools and Ghidra. Discover how to leverage printf vulnerabilities to leak sensitive information, with detailed explanations geared toward beginners in binary exploitation. Gain practical experience with CTF tools and techniques while working through a themed challenge that combines educational value with engaging content. Complete with source code review and comprehensive resources for further learning in binary exploitation, bug bounty hunting, and CTF competitions.

Syllabus

Start
Basic file checks
Explore functionality
Identify format string vulnerability
PwnTools script
Disassemble with Ghidra
Leak flag
Challenge source code
End

Taught by

CryptoCat

Reviews

Start your review of Format String Vulnerability Tutorial - Binary Exploitation Challenge

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.