This is the second write up of windows exploit challenge Examenes from https://github.com/naivenom/exploiting in this post we will finish the last two remaining challenge I put the payload at my GitHub feel free to copy it: https://github.com/sleepyowl-beep/exploit_development/tree/master/EXAMENES-Challenge Without further ado! Let's Do This! Challenge 6: Just like the previous challenge the program open the file named "example.txt" using fopen() function, read the first 20 bytes of the content and move it again to a different variable using strcpy to be used as parameter for function EXAMEN_L.009A10D0. Let's try to generate a new example.txt file that contains 200 characters and follow the program flow as we follow the called function, it turns out the function itself called another function named EXAMEN_L.009A1000 Inside the function, we can see there are a bunch of checks that we need to analyze. The first two red boxes show that our inpu...
Talk about Binary Analysis and Android Mobile security | I Create THINGS that Break THINGS :D