DIVA - Input Validation - Part 3


We reached to our final challenge in this the objective is to do DOS the application and crash it
13-1
As the hint mention that this is a classic example of memory corruption or stack based buffer overflow
13-2
As you can see there is strcpy function available in the library of the application, so letโ€™s try with something simple to understand where we are
13-3
Generate a string of Aโ€™s and feed it inside the application to see the response in Logcat
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
13-4
Now push the red button
13-5
And you will notice the application crashed successfully, basically the challenge finished at this stage, but I decided to go ahead and take a reverse shell, which turn out to be the worst decision for me ๐Ÿ˜‚, as expected Android binary exploitation should be similar what we expirience in a normal linux machine, untill unless you are using a ARM based architecture which is slightly different, but that was my mistake to think like that, becasue the application was coustom build and have lot of restriction which I had never experienced, and later as usual my mentor KNX came to rescue me from this hell ๐Ÿ˜‚. I have shared my overall experience in the next Blog Binary from Hell ๐Ÿ˜ˆ

~ tavลŸanฤฑ sever

Twitter / Hack The Box / CTF Team / Teck_N00bs Community Telegram

Comments