<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="http://wiki.zenk-security.com/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://wiki.zenk-security.com/feed.php">
        <title>Zenk - Security hackingweek_2014:exploit</title>
        <description></description>
        <link>http://wiki.zenk-security.com/</link>
        <image rdf:resource="http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico" />
       <dc:date>2026-04-20T03:54:07+02:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit1&amp;rev=1393843614&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit2&amp;rev=1393966070&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit3&amp;rev=1393843585&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit4&amp;rev=1393868458&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit5&amp;rev=1393843531&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico">
        <title>Zenk - Security</title>
        <link>http://wiki.zenk-security.com/</link>
        <url>http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico</url>
    </image>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit1&amp;rev=1393843614&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-03T11:46:54+02:00</dc:date>
        <title>hackingweek_2014:exploit:exploit1</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit1&amp;rev=1393843614&amp;do=diff</link>
        <description>Source :


#define _GNU_SOURCE
#include &lt;stdlib.h&gt;
#include &lt;unistd.h&gt;
int main(){
	gid_t gid = getegid();
	uid_t uid = geteuid();
	setresgid(gid, gid, gid);
	setresuid(uid, uid, uid);
	system(&quot;/usr/bin/env echo Find the flaw!&quot;);
	return EXIT_SUCCESS;
}</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit2&amp;rev=1393966070&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-04T21:47:50+02:00</dc:date>
        <title>hackingweek_2014:exploit:exploit2</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit2&amp;rev=1393966070&amp;do=diff</link>
        <description>Source :


#include &lt;stdlib.h&gt;
#include &lt;string.h&gt;
void func(char *str) {
	char buffer[32];
	strcpy (buffer, str);
}
int main (int argc, char **argv) {
	volatile int i = 0;
	if (argc &gt; 1)
		func (argv[1]);
	if (i)
		system (&quot;/bin/sh&quot;);
	return EXIT_SUCCESS;
}</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit3&amp;rev=1393843585&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-03T11:46:25+02:00</dc:date>
        <title>hackingweek_2014:exploit:exploit3</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit3&amp;rev=1393843585&amp;do=diff</link>
        <description>Source :


#include &lt;string.h&gt;
int main (int argc, char *argv[]) {
	char buffer[64];
	if (argc &gt; 1)
		strcpy (buffer, argv[1]);
	return 0;
}


La vulnérabilité se trouve au niveau de l'appel à la fonction strcpy() qui copie l'argument d'entrée dans un tableau de 64.</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit4&amp;rev=1393868458&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-03T18:40:58+02:00</dc:date>
        <title>hackingweek_2014:exploit:exploit4</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit4&amp;rev=1393868458&amp;do=diff</link>
        <description>Ici, l'épreuve est simple. Une fois de plus, un binaire nous est donné avec son code C associé.


#include &lt;stdio.h&gt;
#include &lt;stdlib.h&gt;
#include &lt;string.h&gt;
#include &lt;unistd.h&gt;
int target;
void bar() {
	system(&quot;/bin/sh &lt;&gt;/dev/tty&quot;);
	_exit(EXIT_SUCCESS);
}
void foo() {
	char buffer[512];
	fgets(buffer, sizeof(buffer), stdin);
	printf(buffer);
	exit(EXIT_SUCCESS);
}
int main() {
	foo();
	return EXIT_SUCCESS;
}</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit5&amp;rev=1393843531&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-03-03T11:45:31+02:00</dc:date>
        <title>hackingweek_2014:exploit:exploit5</title>
        <link>http://wiki.zenk-security.com/doku.php?id=hackingweek_2014:exploit:exploit5&amp;rev=1393843531&amp;do=diff</link>
        <description>Source :


#include &lt;stdio.h&gt;
#include &lt;stdlib.h&gt;
#include &lt;string.h&gt;
#include &lt;unistd.h&gt;
#include &lt;libgen.h&gt;
#include &lt;sys/types.h&gt;
char *program;
struct task {
	int priority;
	char *name;
};
void foo() {
	system(&quot;/bin/sh&quot;);
	exit(EXIT_SUCCESS);
}
struct task *task_alloc() {
	struct task *task = malloc(sizeof(struct task));
	if (!task) {
		fprintf(stderr, &quot;%s: error: out of memory\n&quot;, program);
		exit(EXIT_FAILURE);      
	}
	task-&gt;name = malloc(8 * sizeof(char));
	if (!task-&gt;name) {
		fprintf(…</description>
    </item>
</rdf:RDF>
