Search found 26 matches

Return to advanced search

Re: Microcorruption: Reverse Engineering and Exploitation

I think you're overthinking it. Reykjavik starts to execute code that is deep in the stack (not shown in the disassembler) but you can still see the code (shellcode) and the exact commands by stepping through after entering you're input. After entering input, use 's' to step through and watch and/or...
by d1str0
on Fri Mar 14, 2014 7:57 pm
 
Forum: General
Topic: Microcorruption: Reverse Engineering and Exploitation
Comments: 27
Views: 36972

Re: Need a book for learning how make hacking applications?

Thanks, after reading some of hacking the art of exploitation. i got that book, but it brings up assembly language. so i was wondering if there are any good tutorials or books for gaining a better understanding in these areas. H:TaoE is good for learning ASM. I'd look into Practical Malware Analysi...
by d1str0
on Sun Mar 09, 2014 10:42 pm
 
Forum: Books
Topic: Need a book for learning how make hacking applications?
Comments: 7
Views: 16682

Re: Microcorruption: Reverse Engineering and Exploitation

0x2400 + r15
by d1str0
on Sun Mar 09, 2014 10:40 pm
 
Forum: General
Topic: Microcorruption: Reverse Engineering and Exploitation
Comments: 27
Views: 36972

Re: Microcorruption: Reverse Engineering and Exploitation

These are wonderful challenges! I'm still working on New Orleans, but I'm confident I'll figure it out eventually. One thing I don't understand about the assembly, though: the jump and call instructions seem to give both an address and a label to jump to. If the code was disassembled, how do I know...
by d1str0
on Sun Mar 09, 2014 9:03 pm
 
Forum: General
Topic: Microcorruption: Reverse Engineering and Exploitation
Comments: 27
Views: 36972

Re: Microcorruption: Reverse Engineering and Exploitation

Well, when I get to the check_password function and it compares #0x3e7c to 0x0(r15) the carry flag is set so I change sr to 0002 to set the zero flag so it won't jump in the next instruction when it clears r14, then the door unlocks. but I have no idea what the password would be, in the tutorial th...
by d1str0
on Sun Mar 09, 2014 6:06 pm
 
Forum: General
Topic: Microcorruption: Reverse Engineering and Exploitation
Comments: 27
Views: 36972

Re: Microcorruption: Reverse Engineering and Exploitation

Feel free to post a little bit regarding what you've tried. Just try not to make it too spoilerish.
by d1str0
on Sat Mar 08, 2014 9:06 pm
 
Forum: General
Topic: Microcorruption: Reverse Engineering and Exploitation
Comments: 27
Views: 36972

Re: Basic Mission 8

This mission is frustrating because I feel like the thing I'm trying could possibly work, but its not apparently what the mission is looking for. Can someone at least give me a hint on this: I got the list of files, and need to come up with a modification of that command that will let me view a fil...
by d1str0
on Fri Mar 07, 2014 12:18 am
 
Forum: Basic
Topic: Basic Mission 8
Comments: 283
Views: 427240

Microcorruption: Reverse Engineering and Exploitation

Official discussion thread for all Microcorruption challenges. Please no spoilers but feel free to ask questions if you are stuck!
by d1str0
on Thu Mar 06, 2014 11:32 pm
 
Forum: General
Topic: Microcorruption: Reverse Engineering and Exploitation
Comments: 27
Views: 36972

Re: Hacking over Wifi

It's not as easy as it sounds although being on the inside of someone's network definitely makes things easier. I suggest you learn more about networking and check out metasploit. I also highly suggest Kevin Mitnick's book "Ghost in the Wires" to get a more realistic look into hacking.
by d1str0
on Thu Mar 06, 2014 11:30 pm
 
Forum: NZone
Topic: Hacking over Wifi
Comments: 3
Views: 6018
Next

Return to advanced search

cron