Fun with SROP Exploitation

This post is regarding another solution for the same problem mentioned in Return to VDSO using ELF Auxiliary Vectors. So the idea here is to exploit a tiny binary remotely using SigReturn Oriented Programming (SROP) without info leak or bruteforce. Below is the challenge code: section .textglobal _startvuln: sub esp,…

Fun with SROP Exploitation

This post is regarding another solution for the same problem mentioned in Return to VDSO using ELF Auxiliary Vectors. So the idea here is to exploit a tiny binary remotely using SigReturn Oriented Programming (SROP) without info leak or bruteforce. Below is the challenge code: section .textglobal _startvuln: sub esp,…

Update from the GSoC 2

As part of GSoC I (dkreuter) and sushant94 have been working the last three weeks on what should become the basis for a decompiler integrated with the radare2 reversing framework. For now it’s a standalone program written in Rust that can read the radare2 code format ESIL. The rough process…

Update From the GSoC

As you know, we have 2 students working on r2 for the Google Summer of Code! As we’re 3 weeks into the Summer, here’s what one of our student, sushant94 has to say about what he’s been working on! It’s been three weeks into GSoC and I’m having an amazing…

Radare 0.9.9

Today, we’re releasing a new version of radare2, the 0.9.9, codename Almost There. Since you might be a bit too lazy to read every single commit, we’re going to highlight some cool new features! Numbers Thanks to more than 50 contributors who issued something like 1700 commits, here is what…