Mobile Application Security Labs
Link Liar
This challenge focuses on a fictitious app called Link Liar, which scans URLs to detect any malicious content. Your objective is to identify the buffer overflow vulnerability and retrieve the hidden flag within the app.
Outline
Link Liar contains a buffer overflow vulnerability that can be exploited to overwrite memory and change the program’s control flow. It includes a complex workflow that must be understood to successfully exploit the vulnerability.
Objective
Your task is to write an exploit that takes advantage of the vulnerability to retrieve the hidden flag within the app.
Skills Required
- Reverse Engineering: Proficiency in disassembling and analyzing compiled code.
- Overflows and Memory Corruption: Knowledge of how buffer overflows occur and how they can alter program control flow.
- Debugging: Proficiency in using GDB or LLDB to inspect and manipulate program execution.

Course Lessons

Copyright © 2024
Company
Registration:
89905814
VAT:
NL004770321B63
89905814
VAT:
NL004770321B63