Mobile Application Security Labs 

Link Liar

This challenge focuses on a fictitious app called Link Liar, which scans URLs to detect any malicious content. Your objective is to identify the buffer overflow vulnerability and retrieve the hidden flag within the app.

Outline

Link Liar contains a buffer overflow vulnerability that can be exploited to overwrite memory and change the program’s control flow. It includes a complex workflow that must be understood to successfully exploit the vulnerability.

Objective

 Your task is to write an exploit that takes advantage of the vulnerability to retrieve the hidden flag within the app.


Skills Required

  • Reverse Engineering: Proficiency in disassembling and analyzing compiled code.
  • Overflows and Memory Corruption: Knowledge of how buffer overflows occur and how they can alter program control flow.
  • Debugging: Proficiency in using GDB or LLDB to inspect and manipulate program execution.

Course Lessons