Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
reverse-engineering
buffer-overflow-attack
infosec
webshell
dirtycow
suexec
privilege-escalation-exploits
ret2libc
arbitrary-code-execution
shellcode-injection
nop-slides
-
Updated
Feb 9, 2022 - C