Giter Club home page Giter Club logo

zenysec-exploit-exercises's Introduction

ZenySec-Exploit-Exercises

Exploit Exercises for Security Researchers

Infrastructure to create multi architecture environments with a collection of vulnerable binaries

Website

zenysec.com

Architectures

Armv7 (32bit)

e.zenysec.com

ch00 - Stack Buffer Overflow

ch01 - Stack Buffer Overflow

ch02 - Stack Buffer Overflow

ch03 - Return Oriented Programming

ch04 - Buffer Overflow

ch05 - Format String

ch06 - Shellcode

ch07 - Return Oriented Programming

ch08 - Return Oriented Programming

ch09 - Return Oriented Programming

ch10 - Shellcode

ch11 - Heap Buffer Overflow

ch12 - Use After Free

Intel i386 (32bit)

e.zenysec.com

ch00 - Stack Buffer Overflow

ch01 - Stack Buffer Overflow

ch02 - Stack Buffer Overflow

ch03 - Return Oriented Programming

ch04 - Buffer Overflow

ch05 - Format String

ch06 - Shellcode

ch07 - Return Oriented Programming

ch08 - Shellcode

ch09 - Heap Buffer Overflow

ch10 - Use After Free

Prerequisites

Python 2.7
Docker

Getting Started

Example to generate i386 environment with ssh service on port 20000

git clone https://github.com/eLoopWoo/zenysec-exploit-exercises
cd zenysec-exploit-exercises
python main.py -d exercises-i386 -ca -r -p 20000 -a i386 -as no

Example to generate arm32v7 environment with ssh service on port 20000

git clone https://github.com/eLoopWoo/zenysec-exploit-exercises
cd zenysec-exploit-exercises
python main.py -d exercises-arm32v7 -ca -r -p 20000 -a arm32v7 -as no

The goal is to login via a basic user "exercise" and escalate privileges to a second user "exercise_root" and read the contents of a protected "flag" file. ( challenge name, user and password are equal in basic users )

Example for exercise ch00

user: ch00
password: ch00

user: ch00_root
password: default (unknown)

Compiled binaries located under "binaries" directory

Sources located under "exercises-architecture" directory (architecture dependant)

Todo's

  • Add more exercises ( integer, timing, heap corruption... )
  • Add exercises with different malloc implementations ( glibc, jemalloc... )
  • Add more architectures ( mips, risc-v, amd64... )

Help & Guidance

Create issues with the specific problem. Any further questions or requests Tweet me @tomereyz

Authors

  • Tomer Eyzenberg - Initial work - eLoopWoo

zenysec-exploit-exercises's People

Contributors

eloopwoo avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.