In this post, we covered the basic steps to take in order to analyze a binary using several tools such as checksec and Gdb debugger. The purpose is to check the binary architecture, shellcode execution protections and whether it’s vulnerable to buffer overflow. This video was part of HackTheBox Cyber Apocalypse 2023 Track.

This post covers the walkthrough for HackTheBox Questionnaire

Challenge Description

It’s time to learn some things about binaries and basic c. Connect to a remote server and answer some questions to get the flag.

Get Buffer Overflow Notes

Video Walk-through

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles