Go to file
2025-05-15 14:11:40 +02:00
level00 rename all the exploits to exploit.sh 2025-05-15 14:10:09 +02:00
level01 rename all the exploits to exploit.sh 2025-05-15 14:10:09 +02:00
level02 rename all the exploits to exploit.sh 2025-05-15 14:10:09 +02:00
level03 rename all the exploits to exploit.sh 2025-05-15 14:10:09 +02:00
level04 rename all the exploits to exploit.sh 2025-05-15 14:10:09 +02:00
level05 level05: done (exploit modified to a better shellcode) 2025-05-15 14:00:44 +02:00
level06 level06: done (uwu) 2025-05-10 15:31:59 +02:00
level07 rename all the exploits to exploit.sh 2025-05-15 14:10:09 +02:00
level08 level08: add cd /tmp in the exploit 2025-05-15 14:11:40 +02:00
level09 rename all the exploits to exploit.sh 2025-05-15 14:10:09 +02:00
en.subject.pdf clean: remove useless dir 2025-05-15 12:37:10 +02:00
README.md rename all the exploits to exploit.sh 2025-05-15 14:10:09 +02:00

OverRide

Override is a project where the goal is to exploit vulnerabilities in binaries by reverse engineering them to make them display a file containing passwords. It is divided into 9 mandatory levels and 1 bonus level (level00 to level08, level09 being the bonus).

Methodology

This project was carried out using peer programming. Working together on the same machine, we decompiled binaries, tested various exploits, and analyzed vulnerabilities collaboratively.

Subject