This project is an introduction to the exploitation of (elf-like) binaries in i386 systems.
- level0: Basic reverse-engineering
- level1: Stack-buffer overflow
- level2: Stack-buffer overflow with stack execution check
- level3: Format strings - Arbitrary write I
- level4: Format strings - Arbitrary write II
- level5: Format strings - PLT-stub overwrite
- level6: Heap-buffer overflow - Unsafe strcpy
- level7: Heap-buffer overflow - PLT-stub overwrite
- level8: Heap-buffer out-of-bound access
- level9: Heap-buffer overflow - C++ v-table pointer overwrite
- bonus0: Stack-buffer overflow - Unsafe strncpy I
- bonus1: Cast to unsigned after signed comparison
- bonus2: Stack-buffer overflow - Unsafe strncpy II
- bonus3: Unsafe atoi usage