description |
---|
07/17/23 |
Note: Be warned, I ended up doing these challenges locally to use pwndbg
and pwntools
.
Download a Qcow2 image according to your CPU's arch:
{% embed url="http://exploit.education/downloads/" %}
Installing qemu:
sudo apt-get install qemu-system -y
Unzip Phoenix:
tar xJf exploit-education-phoenix-amd64-v1.0.0-alpha-3.tar\(2\).xz
Additional steps:
cd exploit-education-phoenix-amd64/
chmod +x boot-exploit-education-phoenix-amd64
./boot-exploit-education-phoenix-amd64.sh
We can now SSH into our QEMU binary as soon as it has finished booting:
ssh -p2222 user@localhost
password: user
Phoenix is the spiritual successor to the Protostar challenges. It covers the following topics:
- Network programming
- Stack overflows
- Format string vulnerabilities
- Heap overflows
The idea is to introduce the simplest concepts first, from memory corruption, modification, function redirection, and eventually, executing shellcode. These challenges are available for both 32 bit, and 64 bit mode. The 64 bit challenges are new, and were not available on Protostar.
{% embed url="http://exploit.education/phoenix/" %}