Skip to content

Latest commit

 

History

History
53 lines (35 loc) · 1.55 KB

File metadata and controls

53 lines (35 loc) · 1.55 KB
description
07/17/23

🦅 Phoenix

Installation

Note: Be warned, I ended up doing these challenges locally to use pwndbg and pwntools.

Download a Qcow2 image according to your CPU's arch:

{% embed url="http://exploit.education/downloads/" %}

Installing qemu:

sudo apt-get install qemu-system -y

Unzip Phoenix:

tar xJf exploit-education-phoenix-amd64-v1.0.0-alpha-3.tar\(2\).xz

Additional steps:

cd exploit-education-phoenix-amd64/
chmod +x boot-exploit-education-phoenix-amd64
./boot-exploit-education-phoenix-amd64.sh

We can now SSH into our QEMU binary as soon as it has finished booting:

ssh -p2222 user@localhost
password: user

Introduction

Phoenix is the spiritual successor to the Protostar challenges. It covers the following topics:

  • Network programming
  • Stack overflows
  • Format string vulnerabilities
  • Heap overflows

The idea is to introduce the simplest concepts first, from memory corruption, modification, function redirection, and eventually, executing shellcode. These challenges are available for both 32 bit, and 64 bit mode. The 64 bit challenges are new, and were not available on Protostar.

{% embed url="http://exploit.education/phoenix/" %}