前言
笔者Sud0是Corelan安全组织成员(f6aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4G2M7X3g2D9j5h3&6Q4x3X3g2T1k6g2)9K6b7e0R3^5x3o6m8Q4x3V1k6A6L8X3c8W2P5q4)9J5k6i4m8Z5M7q4)9J5c8Y4y4W2j5%4g2J5K9i4c8&6i4K6u0r3j5$3!0J5k6h3I4S2L8W2)9J5k6s2c8W2j5h3#2Q4x3X3c8E0k6h3#2T1k6i4u0K6i4K6u0r3i4@1g2r3i4@1u0o6i4K6R3&6i4@1g2r3i4@1u0o6i4K6S2o6i4@1f1#2i4K6R3^5i4K6W2m8i4@1f1^5i4@1t1#2i4@1p5J5i4@1f1#2i4@1u0q4i4K6V1%4e0$3k6X3k6h3&6K6K9i4k6W2 Security Exploit weekend(068K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3!0X3k6X3g2F1M7$3W2$3k6g2)9J5k6s2y4W2j5%4g2J5K9i4c8&6i4K6u0W2j5$3!0E0i4K6u0r3L8$3k6X3M7$3g2U0i4K6u0r3k6i4S2H3L8r3!0A6N6q4)9J5k6s2N6W2k6h3E0W2L8X3c8Q4x3V1k6Q4c8f1k6Q4b7V1y4Q4z5o6W2Q4c8e0g2Q4b7e0c8Q4b7e0N6Q4c8e0S2Q4b7U0g2Q4z5f1u0Q4c8e0g2Q4z5o6k6Q4b7e0m8Q4c8e0g2Q4z5o6k6Q4z5f1u0Q4c8f1k6Q4b7V1y4Q4z5p5y4Q4c8e0S2Q4b7V1k6Q4z5e0W2Q4c8e0k6Q4z5e0S2Q4b7f1k6Q4c8e0c8Q4b7U0S2Q4z5o6m8Q4c8e0g2Q4z5f1y4Q4b7V1q4Q4c8e0N6Q4z5e0c8Q4b7U0q4a6k6X3k6W2L8Y4y4A6N6X3f1`. Security举办的exploit编写大赛。这项挑战赛以存在漏洞的Foxit Reader软件为目标,每一参赛者都会先得到一份Proof of Concept exploit(749K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2W2P5s2m8D9L8$3W2@1i4K6u0V1k6r3u0Q4x3X3g2U0L8$3#2Q4x3V1k6W2P5s2m8D9L8$3W2@1M7#2)9J5c8U0p5#2y4e0p5@1i4@1g2r3i4@1u0o6i4K6R3&6i4@1g2r3i4@1u0o6i4K6S2o6i4@1f1#2i4@1t1&6i4@1t1$3i4@1f1#2i4@1t1%4i4@1t1J5i4@1f1$3i4K6V1^5i4K6S2q4i4@1f1%4i4@1p5I4i4@1q4q4i4@1f1$3i4K6S2o6i4K6R3%4i4@1f1#2i4K6R3%4i4@1u0m8i4@1f1^5i4@1u0r3i4K6V1&6i4@1f1$3i4K6V1^5i4@1q4r3i4@1f1@1i4@1t1^5i4@1q4m8i4@1f1$3i4@1u0m8i4@1p5J5i4@1f1#2i4K6R3%4i4@1u0m8i4@1f1$3i4@1u0o6i4K6S2r3i4@1f1$3i4@1t1@1i4K6W2q4i4@1g2r3i4@1u0o6i4K6S2o6i4@1f1#2i4K6S2r3i4@1q4r3i4@1f1&6i4K6R3H3i4K6W2m8i4@1f1^5i4@1u0r3i4K6R3%4i4@1f1$3i4K6S2q4i4@1p5%4i4@1f1#2i4K6R3^5i4@1t1$3i4@1f1%4i4@1u0n7i4K6V1K6i4@1f1$3i4K6W2q4i4K6R3@1i4@1f1#2i4K6S2o6i4K6V1$3i4@1f1#2i4@1u0o6i4K6R3J5i4@1f1#2i4@1t1^5i4@1t1^5i4@1f1#2i4@1p5@1i4K6R3@1i4@1f1%4i4K6V1H3i4K6R3$3i4@1f1^5i4@1q4q4i4@1t1H3i4@1f1#2i4@1u0p5i4K6V1#2i4@1g2r3i4@1u0o6i4K6R3^5M7%4c8J5N6h3y4@1N6i4u0W2k6l9`.`. exception handling record)来获得权限。下面是Offensive Security在其官方博客上公布的信息:
Aloha Offsec students! You’ve been slapped around by Bob, abused by Nicky and crushed by NNM. Just as you thought it was over, Offensive Security now comes up with a brand new type of pain. This one is for all you hardcore exploit developers out there, who want a real challenge – an Offsec “Exploit Weekend”.
This is the deal: We provide you with a proof of concept, with EIP handed to you on a golden platter. All you need to do is get a shell….muhahaha. The event will take place next weekend, 13th-14th of November and is open to Offsec alumni only. The first person to send in a working POC with a bindshell payload on port 4444 wins a 32 GB WiFi Ipad!
For more information, check out the Offsec Student forms. If you haven’t signed up for the 1day club forums, send in an email to our orders dept. with your OSID!