Skip to main content

Posts

Showing posts with the label Leviathan 1

Over the Wire - Leviathan 1

Leviathan 1 Objective Solution ok so lets see whats in the home direcotry leviathan1@leviathan:~$ ls check leviathan1@leviathan:~$ file ./check ./check: setuid ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=c735f6f3a3a94adcad8407cc0fda40496fd765dd, not stripped ok so there is a binary there lets see what it does.. leviathan1@leviathan:~$ ./check password: jjj Wrong password, Good Bye ... It's checking for a password  I assume if given the correct password it will give us the password to the next level I orignally solved this a much different way looking a the text contained in the binary file but then found out about ltrace which make this much simplier leviathan1@leviathan:~$ ltrace ./check __libc_start_main(0x804853b, 1, 0xffffd784, 0x8048610 <unfinished ...> printf("password: ")                              = 10 getchar(1, 0, 0x65766f6c, 0x646f