o-o-overflow / chall-www

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

chall-www

All you get is a URL input, that's it. Can you exploit it?

deployment has the Vagrantfile and ansible script necessary.

exploit has the exploit that works.

The challenge is running the original WWW web browser written by Sir. Tim Berners-Lee.

It is version 0.15 of the WWW browser, and you can tell becuase of the hash sent by the frontend: 520d462abb92809b4fa1eaaafabbaee4

This is the md5 of the WorldWideWeb.app/WorldWideWeb binary.

There is a buffer overflow in HTTP.c :

strcpy(command, "GET ");

Exploiting this gets you a shell, once you send proper shellcode.

Check out exploit

TAGS: pwn

LEVEL: med/hard? (very hard to tell)

STATUS: ready to deploy

AUTHOR: adamd

TESTED BY: nobody.

About


Languages

Language:C 70.6%Language:Makefile 12.0%Language:Assembly 8.9%Language:C++ 3.5%Language:Python 3.1%Language:CMake 1.1%Language:Objective-C 0.7%Language:Roff 0.1%Language:Shell 0.1%Language:Ruby 0.0%