Summary
In this post, we covered the basic steps to take in order to analyze a binary using several tools such as checksec and Gdb debugger. The purpose is to check the binary architecture, shellcode execution protections and whether it’s vulnerable to buffer overflow. This video was part of HackTheBox Cyber Apocalypse 2023 Track.
This post covers the walkthrough for HackTheBox Questionnaire
Challenge Description
It’s time to learn some things about binaries and basic c. Connect to a remote server and answer some questions to get the flag.
Video Walk-through
Show Comments