Premium Only Content
![Linked List Exploit Continued - GOT Overwrite - "Links 2+3" Pwn Challenge [ImaginaryCTF]](https://1a-1791.com/video/s8/1/V/Z/T/A/VZTAh.qR4e-small-Linked-List-Exploit-Continu.jpg) 
			Linked List Exploit Continued - GOT Overwrite - "Links 2+3" Pwn Challenge [ImaginaryCTF]
"Links 2" (Pwn) challenge from ImaginaryCTF (iCTF) 27/06/22 - "It turns out that there was a bug in how I was handling writing some elements, so I've fixed that. Also, I've stopped putting the flag in a global variable, because that's probably not a good idea. Double check my implementation one more time for me?". In this challenge we'll use Ghidra, GDB-PwnDbg and PwnTools to exploit a vulnerable custom LinkedList implementation by overwriting an global offset table GOT entry to point system(), so we can get a shell.
"Links 3" (Pwn) challenge from ImaginaryCTF (iCTF) 30/06/22 - "And now you guys are exploiting my View Time feature that I put there solely for your convenience? Fine, then - no more time for you!". This challenge has no view_time() function, so we lose the system() call. However, we can leak an arbitrary function from the GOT and use the Lib-C database to find the correct offsets (ret2libc). Hope you enjoy 🙂 #CTF #iCTF #ImaginaryCTF #Pwn #BinaryExploitation
Write-ups: https://github.com/Crypto-Cat/CTF/tree/main/ctf_events/ictf/pwn/links
↢Social Media↣
Twitter: https://twitter.com/_CryptoCat
GitHub: https://github.com/Crypto-Cat
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn: https://www.linkedin.com/in/cryptocat
Reddit: https://www.reddit.com/user/_CryptoCat23
YouTube: https://www.youtube.com/CryptoCat23
Twitch: https://www.twitch.tv/cryptocat23
↢ImaginaryCTF↣
https://imaginaryctf.org
https://twitter.com/imaginaryctf
https://discord.gg/9r8AJQkfs3
↢Video-Specific Resources↣
https://libc.blukat.me
https://libc.rip
↢Resources↣
Ghidra: https://ghidra-sre.org/CheatSheet.html
Volatility: https://github.com/volatilityfoundation/volatility/wiki/Linux
PwnTools: https://github.com/Gallopsled/pwntools-tutorial
CyberChef: https://gchq.github.io/CyberChef
DCode: https://www.dcode.fr/en
HackTricks: https://book.hacktricks.xyz/pentesting-methodology
CTF Tools: https://github.com/apsdehal/awesome-ctf
Forensics: https://cugu.github.io/awesome-forensics
Decompile Code: https://www.decompiler.com
Run Code: https://tio.run
↢Chapters↣
Start: 0:00
Links 1 Recap: 0:30
Reviewing Heap Layout in GDB-PwnDbg: 3:25
Keeping the Heap intact: 7:45
Links 2 Attack Plan: 11:55
Overwriting the GOT: 16:48
Stack Alignment: 20:08
Solution (leak system): 23:27
Links 3 (leak another lib-c function): 28:08
Recap: 33:27
End: 34:29
- 	
				 LIVE LIVEThe Bubba Army23 hours agoIs Killing The New Trend??! - Bubba the Love Sponge® Show | 10/31/251,369 watching
- 	
				 2:25:16 2:25:16Demons Row14 hours ago $4.31 earnedEx Hells Angels MC President: Charles “Peewee”Goldsmith (Full Interview)15.6K4
- 	
				 3:35 3:35Gamazda12 hours ago $5.23 earnedThe Darkest Piano Theme?22.2K38
- 	
				 13:42 13:42Nate The Lawyer20 hours ago $4.11 earnedINSANE Judge REMOVED For Lying Under Oath, Insurance Fraud & Stolen Valor18.9K15
- 	
				 38:32 38:32Code Blue Cam1 day agoHow Police Stopped a Potential Church Massacre...50.3K12
- 	
				 24:26 24:26Actual Justice Warrior1 day agoWelfare Queens RAGE OUT Over Food Stamp Cuts21K63
- 	
				 3:05:11 3:05:11Inverted World Live12 hours agoThe Halloween Special with Drea De Matteo and Sam Tripoli | Ep. 133369K17
- 	
				 2:57:52 2:57:52Laura Loomer15 hours agoEP154: Naturalized US Navy Medic From GAZA Exposed For Ties To Hamas53K32
- 	
				 35:45 35:45Stephen Gardner18 hours ago🔴BREAKING: Election Auditor EXPOSES Democrat Election Fraud Evidence!60.4K79
- 	
				 15:48 15:48Sponsored By Jesus Podcast22 hours agoHow to Stop Being JEALOUS | When Comparison Steals Your Joy26.6K13