Category: Fusion

Fusion exploit exercises – level01

Level01 of Fusion is very similar to the level00, however we do not know the address of the buffer, and we have ASLR active. I used the python script from the previous exercise with the ret address of “\x42\x42\x42\x42”, started the application in gdb and crashed it, and checked the state of the registers. ESP…


Fusion Exploit exercises – level00

Recently I finished the Protostar exploit exercises. I decided to continue and pass the next level, the Fusion, which teaches bypassing the various modern exploitation prevention systems. It has 15 levels, from level00 to level14. This blog post is the first level, which is a simple stack overflow exercise. Level00 does not have any protection….