Level01 of Fusion is very similar to the level00, however we do not know the address of the buffer, and we have ASLR active. I used the python script from the previous exercise with the ret address of “\x42\x42\x42\x42”, started the application in gdb and crashed it, and checked the state of the registers. ESP…
Recently I finished the Protostar exploit exercises. I decided to continue and pass the next level, the Fusion, which teaches bypassing the various modern exploitation prevention systems. It has 15 levels, from level00 to level14. This blog post is the first level, which is a simple stack overflow exercise. Level00 does not have any protection….
- This blog is dedicated to my research and experimentation on ethical hacking. The methods and techniques published on this site should not be used to do illegal things. I do not take responsibility for acts of other people.