Overstuffed buffers and the curious claws that find them¶
Here’s where things get messy in the best possible way. These training grounds are dedicated to the chaotic elegance of buffer overflows: pushing past memory limits, hijacking execution flow, and poking around where polite code would not dare. Much like a raccoon that ignores size constraints to wedge itself into an overflowing compost heap, force your way in, take control, and rummage through the guts of vulnerable systems.
Like a raccoon squeezing into a bin that’s clearly too small, sometimes it spills over spectacularly.
- The raccoon dives into virtual bins and finds real exploits
- Rooting around in memory with mischievous intent
- ELF x86: Stack buffer overflow basic 1
- ELF x64: Basic heap overflow
- ELF x86: Stack buffer overflow basic 2
- ELF x86: Format string bug basic 1
- ELF x64: Stack buffer overflow basic
- ELF x86: Format string bug basic 2
- ELF x86: Race condition
- ELF ARM: Stack buffer overflow basic
- ELF x86: Stack buffer overflow basic 3
- ELF x86: Use after free basic
- ELF x86: BSS buffer overflow
- ELF x86: Stack buffer overflow basic 4
- ELF x86: Stack buffer overflow basic 6
- ELF x86: Format string bug basic 3
- ELF ARM: Basic ROP
- ELF x86: Stack buffer overflow C++ vtables
- ELF x86: Stack buffer overflow basic 5
- ELF x86: Remote format string bug