Protostar Exploitation Series

Hello All,

Before going to start the series of exploitation. Let me clear that I AM NOT AUTHOR of Protostar Machine and most of the content copy from https://exploit-exercises.com/ website.

I have setup a mirrio of https://ee.touhidshaikh.com/

About

Protostar introduces the following in a friendly way:

  • Network programming
  • Byte order
  • Handling sockets
  • Stack overflows
  • Format strings
  • Heap overflows

The above is introduced in a simple way, starting with simple memory corruption and modification, function redirection, and finally executing custom shellcode.

Getting started

Default User’s Credential
Username: user
Password: user

Once the virtual machine has booted, you are able to log in as the “user” account with the password “user” (without the quotes). The levels to be exploited can be found in the /opt/protostar/bin directory.

For debugging the final levels, you can log in as root with password “godmode” (without the quotes)

Core Files

The /proc/sys/kernel/core_pattern is set to /tmp/core.%s.%e.%p. This means that instead of the general ./core file you get, it will be in a different directory and different file name.

Level

  • Stack 0
  • Stack 1
  • Stack 2
  • Stack 3
  • Stack 4
  • Stack 5
  • Stack 6
  • Stack 7
  • Format 0
  • Format 1
  • Format 2
  • Format 3
  • Format 4
  • Heap 0
  • Heap 1
  • Heap 2
  • Heap 3
  • Heap 4
  • Net 0
  • Net 1
  • Net 2
  • Final 0
  • Final 1
  • Final 2

Download Link

Google Drive Link

Important Blog Ports