The remote service ask for a name, if you send more than 64 bytes, a memory leak happens.
The buffer next to the name's is the first random value used to init the srand()
If we get this value, and set our local srand([leaked] ^ [luckyNumber]) we will be able to predict the following randoms and win the game, but we have to see few details more ;)
The function used to read the input until the byte \n appears, but also up to 64 bytes, if we trigger this second condition there is not 0x00 and the print shows the random buffer :)
The nickname buffer:
The seed buffer:
So here it is clear, but let's see that the random values are computed with several gpu instructions which are decompiled incorrectly:
We tried to predict the random and aply the gpu divisions without luck :(
There was a missing detail in this predcitor, but there are always other creative ways to do the things.
We use the local software as a predictor, we inject the leaked seed on the local binary of the remote server and got a perfect syncronization, predicting the remote random values:
The process is a bit ugly becouse we combined automated process of leak exctraction and socket interactive mode, with the manual gdb macro.
The macro:
More info
- Hack Tools
- Hacker Tools For Mac
- Hack Rom Tools
- Beginner Hacker Tools
- Hacking Tools For Windows
- Pentest Tools For Android
- Hacking Tools For Kali Linux
- Hack Tools Pc
- Easy Hack Tools
- Hacking Tools For Windows 7
- Hack Tools
- Github Hacking Tools
- Hack Tools
- Hak5 Tools
- Growth Hacker Tools
- Nsa Hack Tools
- Pentest Tools Subdomain
- Hack Tools Mac
- Game Hacking
- Hacker Tools Linux
- Pentest Tools Open Source
- Hackrf Tools
- Pentest Tools For Ubuntu
- Hack And Tools
- Hack Tools Github
- Usb Pentest Tools
- Hack Tools Mac
- Physical Pentest Tools
- Hack Tools Mac
- Hacker Tools Free Download
- Hacking Tools Mac
- Hack Tool Apk No Root
- Pentest Tools For Ubuntu
- Hack Tools Pc
- Hacking Tools Pc
- Hacker Tools Hardware
- Pentest Tools Bluekeep
- Pentest Tools Download
- Hacking Tools For Windows 7
- How To Hack
- Physical Pentest Tools
- Wifi Hacker Tools For Windows
- Hacking Tools Online
- Best Hacking Tools 2019
- Hacking Tools Pc
- Hacker Tools For Windows
- Pentest Tools Review
- Tools Used For Hacking
- New Hack Tools
- Hack Tools Github
- Pentest Tools Alternative
- Hacking Tools Pc
- Hacker Tools Software
- Pentest Tools Review
- Pentest Tools Website Vulnerability
- Hacking Tools Hardware
- Game Hacking
- Tools For Hacker
- Easy Hack Tools
- Pentest Tools Nmap
- Pentest Tools Nmap
- Hacking App
- Nsa Hack Tools
- Hacker Tools Apk
- Hacking Apps
- Hack Tools Github
- Hack Tool Apk
- Pentest Tools Linux
- Hacking Tools And Software
- Hacking Tools Hardware
- Hack Tools
- Blackhat Hacker Tools
- Pentest Tools Download
- Hacker Tools 2020
- Hacking Tools Kit
- Pentest Tools Github
- Pentest Tools For Windows
- Hack Tools Pc
- Pentest Tools Download
- Pentest Tools For Android
- Beginner Hacker Tools
- Hacking Tools For Beginners
- Hack Tools For Games
- Hacker Tools 2019
- Hacking Tools For Windows Free Download
- Pentest Tools Free
- Hacking Tools Usb
- Hacking Tools Windows
- Hacker Security Tools
- Hacking Tools For Pc
- Nsa Hack Tools
- Tools 4 Hack
- Hacking Tools For Mac
- Hacking Tools For Games
- Hacker Tools 2020
- New Hacker Tools
- Hacker Tools Apk
- Hack Tools For Windows
- Hacker Hardware Tools
- Hack Tools For Ubuntu
- Hacker Tools List
- Hack App
- Hacking Tools Name
- Pentest Box Tools Download
- Hacker Tools Github
- Beginner Hacker Tools
- Pentest Reporting Tools
- Pentest Tools Url Fuzzer
- Pentest Tools Website Vulnerability
- Hacker Tools 2020
- Pentest Tools
- Pentest Tools Alternative
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Url Fuzzer
- Hacker Tools Linux
- Hacks And Tools
- Pentest Automation Tools
- Nsa Hacker Tools
- Hacking Tools Pc
- Install Pentest Tools Ubuntu
- Nsa Hack Tools
- Pentest Tools Apk
- Pentest Tools Linux
- Hack Tools For Ubuntu
- Hacker Tools For Windows