Skip to content

Commit 44463bc

Browse files
committed
Updated site
1 parent 365b3be commit 44463bc

File tree

3 files changed

+2
-2
lines changed

3 files changed

+2
-2
lines changed

en/ctf/ctfatac/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -573,7 +573,7 @@ <h3 id="fini">fini<a hidden class="anchor" aria-hidden="true" href="#fini">#</a>
573573
<h4 id="finding-the-vulnerability">Finding the Vulnerability<a hidden class="anchor" aria-hidden="true" href="#finding-the-vulnerability">#</a></h4>
574574
<p>The vulnerability is easy to spot if you are familiar with format string bugs.<br>
575575
In the decompiled code (see image below), the program calls <code>printf()</code> <strong>without</strong> specifying a format string, like <code>%s</code>:</p>
576-
<p><img alt="Decompiled code showing vulnerable printf" loading="lazy" src="image-1.png"></p>
576+
<p><img alt="Decompiled code showing vulnerable printf" loading="lazy" src="/images/fini.png"></p>
577577
<p>This means user input is passed directly to <code>printf</code>, allowing us to control the format string and leak stack values or write to arbitrary memory.</p>
578578
<p>Additionally, the program provides a feature that lets us write any value to any address—this will be useful for exploitation.</p>
579579
<h4 id="exploiting-the-vulnerability">Exploiting the Vulnerability<a hidden class="anchor" aria-hidden="true" href="#exploiting-the-vulnerability">#</a></h4>

images/fini.png

5.78 KB
Loading

it/ctf/ctfatac/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -573,7 +573,7 @@ <h3 id="fini">fini<a hidden class="anchor" aria-hidden="true" href="#fini">#</a>
573573
<h4 id="individuare-la-vulnerabilità">Individuare la vulnerabilità<a hidden class="anchor" aria-hidden="true" href="#individuare-la-vulnerabilità">#</a></h4>
574574
<p>La vulnerabilità è evidente se conosci i format string bug.
575575
Nel codice decompilato (vedi immagine), il programma chiama <code>printf()</code> <strong>senza</strong> specificare una format string, tipo <code>%s</code>:</p>
576-
<p><img alt="Decompiled code showing vulnerable printf" loading="lazy" src="image-1.png"></p>
576+
<p><img alt="Decompiled code showing vulnerable printf" loading="lazy" src="/images/fini.png"></p>
577577
<p>Questo significa che l’input dell’utente viene passato direttamente a <code>printf</code>, permettendoci di controllare la format string e di leakare valori dallo stack o scrivere in memoria arbitraria.</p>
578578
<p>Inoltre, il programma offre una funzionalità che permette di scrivere qualsiasi valore in qualunque indirizzo—utile per l’exploit.</p>
579579
<h4 id="sfruttare-la-vulnerabilità">Sfruttare la vulnerabilità<a hidden class="anchor" aria-hidden="true" href="#sfruttare-la-vulnerabilità">#</a></h4>

0 commit comments

Comments
 (0)