{"id":5320,"date":"2010-10-23T15:31:46","date_gmt":"2010-10-23T13:31:46","guid":{"rendered":"http:\/\/www.corelan.be:8800\/?p=5320"},"modified":"2010-10-23T15:31:46","modified_gmt":"2010-10-23T13:31:46","slug":"haxx-me-3-corelan-team-documentation","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/","title":{"rendered":"HaXx.Me #3 - Corelan Team documentation"},"content":{"rendered":"<p>Last week (oct 17 2010), Lincoln (one of the Corelan Team members) informed the other team members about an ongoing hacking challenge (HaXx.Me #03) organized and hosted by MaXe (@intern0t).<\/p>\n<p>When I saw his message, it was already Sunday night and I knew I had to get up early the next day. Nevertheless I chose to have a bit of fun before going to sleep.<\/p>\n<p>So let the fun begin...<\/p>\n<h3>The target<\/h3>\n<p>Let's browse the target http:\/\/hax0r.intern0t.net\/<\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image002.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: block; float: none; border-top-width: 0px; border-bottom-width: 0px; margin-left: auto; border-left-width: 0px; margin-right: auto; padding-top: 0px\" title=\"clip_image002\" border=\"0\" hspace=\"12\" alt=\"clip_image002\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image002_thumb.gif\" width=\"676\" height=\"343\" \/><\/a><\/p>\n<p>Ok... After few seconds looking around and trying to spot any hint in the picture I decided it's time to see if the source can tell something useful.<\/p>\n<blockquote>\n<p>&lt;!-- A text record <span style=\"color: #0000ff\">with<\/span> version information <span style=\"color: #0000ff\">in<\/span> the chaos domain can reveal your next step. Services, services, services --&gt;<\/p>\n<\/blockquote>\n<p>A quick search on Google revealed the following interesting OSVDB entry : http:\/\/osvdb.org\/23.<\/p>\n<p>OK, let's try on our target:<\/p>\n<pre style=\"border-bottom: #cecece 1px solid; border-left: #cecece 1px solid; padding-bottom: 5px; background-color: #646464; min-height: 40px; padding-left: 5px; width: 650px; padding-right: 5px; overflow: auto; border-top: #cecece 1px solid; border-right: #cecece 1px solid; padding-top: 5px\">root@bt:~# nslookup -q=txt -<span style=\"color: #0000ff\">class<\/span>=chaos version.bind hax0r.intern0t.net\nServer: hax0r.intern0t.net\nAddress: 178.79.129.211#53\nversion.bind text = &quot;<span style=\"color: #8b0000\">So you finally figured it out.. You need to use me as a nameserver and then browse to google.com in order to continue your journey.<\/span>&quot;<\/pre>\n<p>I followed the advice and got this page:<\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image004.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image004\" border=\"0\" hspace=\"12\" alt=\"clip_image004\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image004_thumb.gif\" width=\"647\" height=\"326\" \/><\/a><\/p>\n<p>Whoa, very interesting... Few more attempts, then time to bed. The challenge must wait until the next day. The next day Fancy joined us and we figured out we need to play with http requests so we used Burp to intercept them...<\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image006.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image006\" border=\"0\" hspace=\"12\" alt=\"clip_image006\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image006_thumb.gif\" width=\"653\" height=\"329\" \/><\/a><\/p>\n<p>After changing the host parameter, we got this :<\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image008.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image008\" border=\"0\" hspace=\"12\" alt=\"clip_image008\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image008_thumb.gif\" width=\"666\" height=\"336\" \/><\/a><\/p>\n<p>The link led us to http:\/\/178.79.129.211\/h4x0r_1t-n0w\/ :<\/p>\n<h3>The real target<\/h3>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image010.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image010\" border=\"0\" hspace=\"12\" alt=\"clip_image010\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image010_thumb.gif\" width=\"668\" height=\"337\" \/><\/a><\/p>\n<p>Oops, not that easy :P... We had to bypass the login page. A quick look at the source code gave us another hint:<\/p>\n<pre style=\"border-bottom: #cecece 1px solid; border-left: #cecece 1px solid; padding-bottom: 5px; background-color: #646464; min-height: 40px; padding-left: 5px; width: 650px; padding-right: 5px; overflow: auto; border-top: #cecece 1px solid; border-right: #cecece 1px solid; padding-top: 5px\">&lt;!-- You can obtain the source <span style=\"color: #0000ff\">in<\/span> <span style=\"color: #0000ff\">this<\/span> file: source.tar --&gt;<\/pre>\n<p>So, we grabbed the source.tar.&#160; With the source code in our hands we tried to bypass the login page. We used burp suite again to intercept our request and see how data is being transmitted...<\/p>\n<p>Hey wait! What happens if we change the login=false to login=true ? \ud83d\ude1b<\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image012.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image012\" border=\"0\" hspace=\"12\" alt=\"clip_image012\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image012_thumb.gif\" width=\"664\" height=\"335\" \/><\/a><\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image014.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image014\" border=\"0\" hspace=\"12\" alt=\"clip_image014\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image014_thumb.gif\" width=\"661\" height=\"333\" \/><\/a><\/p>\n<p>Bingo!!! Successfully logged in!!! \ud83d\ude00<\/p>\n<p>Now how could we make it more useful?<\/p>\n<p>Going back to request there was another parameter &quot;data&quot; and changing it a bit we could see that it was vulnerable to LFI and playing a bit with param we discovered that it was vulnerable to RFI too. This means even more fun \ud83d\ude00<\/p>\n<h3>0wned<\/h3>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image016.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image016\" border=\"0\" hspace=\"12\" alt=\"clip_image016\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image016_thumb.gif\" width=\"669\" height=\"337\" \/><\/a><\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image018.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image018\" border=\"0\" hspace=\"12\" alt=\"clip_image018\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image018_thumb.gif\" width=\"673\" height=\"341\" \/><\/a><\/p>\n<p>Time to get a shell...<\/p>\n<p>Thanks to Nullthreat for providing the php reverse shell. We set up a listener, included it in the data parameter and wondered if the shell will show up.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image020.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image020\" border=\"0\" hspace=\"12\" alt=\"clip_image020\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image020_thumb.gif\" width=\"682\" height=\"344\" \/><\/a><\/p>\n<p>Forwarding the request....<\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image0221.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image022\" border=\"0\" hspace=\"12\" alt=\"clip_image022\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image022_thumb1.gif\" width=\"672\" height=\"341\" \/><\/a><\/p>\n<p>Woot... we are in \ud83d\ude00<\/p>\n<p>The next step is to find the key, obviously we didn't have permission to read the file, so poking around a bit we found a file called localbackdoor in \/home\/scripts, it was a listener to port 51 owned by root.<\/p>\n<p>Connecting...<\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image0241.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image024\" border=\"0\" hspace=\"12\" alt=\"clip_image024\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image024_thumb1.gif\" width=\"676\" height=\"343\" \/><\/a><\/p>\n<p>Boom.. root \ud83d\ude00<\/p>\n<p>So let's read the key and complete the challenge...<\/p>\n<p><a href=\"\/wp-content\/uploads\/2010\/10\/clip_image0261.gif\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-right-width: 0px; padding-left: 0px; padding-right: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px\" title=\"clip_image026\" border=\"0\" hspace=\"12\" alt=\"clip_image026\" src=\"\/wp-content\/uploads\/2010\/10\/clip_image026_thumb1.gif\" width=\"684\" height=\"344\" \/><\/a><\/p>\n<p>The message says: I won the HaXx.Me #03 competition and I should be proud!<\/p>\n<h3>Video<\/h3>\n<p>nullthreat made a nice video about the steps Corelan Team took to complete the challenge :<\/p>\n<div style=\"padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px\" id=\"scid:5737277B-5D6D-4f48-ABFC-DD9C333F4C5D:3361363b-592c-4659-a54a-fc674b55dcf7\" class=\"wlWriterEditableSmartContent\">\n<div><object width=\"751\" height=\"422\"><param name=\"movie\" value=\"http:\/\/www.youtube.com\/v\/omVAlawD2qI?hl=en&amp;hd=1\"><\/param><\/object><\/div>\n<div style=\"width:751px;clear:both;font-size:.8em\">haxx.me nr 3<\/div>\n<\/div>\n<p>or click <a href=\"http:\/\/www.youtube.com\/watch?v=omVAlawD2qI\" target=\"_blank\" rel=\"noopener\">this link<\/a><\/p>\n<p>A documentation video, made by intern0t, can be found here : http:\/\/intern0t.blip.tv\/<\/p>\n<h3>Conclusion &amp; Thanks to<\/h3>\n<p>Nice wargame, good exercise &amp; congrats to the winners of the challenge !<\/p>\n<p>Thanks to :<\/p>\n<ul>\n<li>MaXe for providing the challenge <\/li>\n<li>Corelan Team for working together to complete the challenge <\/li>\n<\/ul>\n<p><!--Digiprove_Start--><span lang=\"en\" xml:lang=\"en\" style=\"vertical-align:middle; display:inline; padding:3px; line-height:normal;border:1px solid #e3e3e3;background-color:#000000;\" title=\"certified 24 October 2010 00:35:44 UTC by Digiprove certificate P57584\" ><a href=\"http:\/\/www.digiprove.com\/show_certificate.aspx?id=P57584;guid=TlDpTkhPnkKn-ABi71-zdA\" target=\"_blank\" rel=\"copyright noopener\" style=\"border:0px; float:none; display:inline; text-decoration: none;background-color:#000000;\"><img decoding=\"async\" src=\"http:\/\/www.digiprove.com\/images\/dp_seal_trans_16x16.png\" style=\"vertical-align:middle; display:inline; border:0px; margin:0px; float:none; background-color:transparent\" border=\"0\" width=\"12px\" height=\"12px\" alt=\"\"\/><span style=\"font-family: Tahoma, MS Sans Serif; font-size:9px; color:#FFFFFF; border:0px; float:none; display:inline; text-decoration:none; letter-spacing:normal\" onmouseover=\"this.style.color='#FFFF1C';\" onmouseout=\"this.style.color='#FFFFFF';\">&nbsp;&nbsp;Copyright secured by Digiprove&nbsp;&copy; 2010 Peter Van Eeckhoutte<\/span><\/a><!--B32B0B97A3CD61278B66920EEA1BB5B885CB7089E49FEEB64329FDD1AA383B2D--><\/span><!--Digiprove_End--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week (oct 17 2010), Lincoln (one of the Corelan Team members) informed the other team members about an ongoing hacking challenge (HaXx.Me #03) organized and hosted by MaXe (@intern0t). When I saw his message, it was already Sunday night and I knew I had to get up early the next day. Nevertheless I chose &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"HaXx.Me #3 - Corelan Team documentation\"<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[127,2394],"tags":[1834,262],"class_list":["post-5320","post","type-post","status-publish","format-standard","hentry","category-security","category-webapp-security","tag-shellcode","tag-corelan-team"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HaXx.Me #3 - Corelan Team documentation - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HaXx.Me #3 - Corelan Team documentation - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Last week (oct 17 2010), Lincoln (one of the Corelan Team members) informed the other team members about an ongoing hacking challenge (HaXx.Me #03) organized and hosted by MaXe (@intern0t). When I saw his message, it was already Sunday night and I knew I had to get up early the next day. Nevertheless I chose &hellip; Continue reading &quot;HaXx.Me #3 - Corelan Team documentation&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2010-10-23T13:31:46+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.digiprove.com\/images\/dp_seal_trans_16x16.png\" \/>\n<meta name=\"author\" content=\"Corelan Team (rick2600)\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/\"},\"author\":{\"name\":\"Corelan Team (rick2600)\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/ef393bec6a72a2d160e96dab55f69d1c\"},\"headline\":\"HaXx.Me #3 - Corelan Team documentation\",\"datePublished\":\"2010-10-23T13:31:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/\"},\"wordCount\":552,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.digiprove.com\\\/images\\\/dp_seal_trans_16x16.png\",\"keywords\":[\"shellcode\",\"corelan team\"],\"articleSection\":[\"Security\",\"Web Application Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/\",\"name\":\"HaXx.Me #3 - Corelan Team documentation - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.digiprove.com\\\/images\\\/dp_seal_trans_16x16.png\",\"datePublished\":\"2010-10-23T13:31:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.digiprove.com\\\/images\\\/dp_seal_trans_16x16.png\",\"contentUrl\":\"http:\\\/\\\/www.digiprove.com\\\/images\\\/dp_seal_trans_16x16.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/10\\\/23\\\/haxx-me-3-corelan-team-documentation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HaXx.Me #3 &#8211; Corelan Team documentation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/ef393bec6a72a2d160e96dab55f69d1c\",\"name\":\"Corelan Team (rick2600)\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b4f5e46e857f06d9ed31ed3c1d37822183763d3293a394db74f8dddeb2893e8?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b4f5e46e857f06d9ed31ed3c1d37822183763d3293a394db74f8dddeb2893e8?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b4f5e46e857f06d9ed31ed3c1d37822183763d3293a394db74f8dddeb2893e8?s=96&d=mm&r=x\",\"caption\":\"Corelan Team (rick2600)\"},\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/rick2600\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HaXx.Me #3 - Corelan Team documentation - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/","og_locale":"en_US","og_type":"article","og_title":"HaXx.Me #3 - Corelan Team documentation - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Last week (oct 17 2010), Lincoln (one of the Corelan Team members) informed the other team members about an ongoing hacking challenge (HaXx.Me #03) organized and hosted by MaXe (@intern0t). When I saw his message, it was already Sunday night and I knew I had to get up early the next day. Nevertheless I chose &hellip; Continue reading \"HaXx.Me #3 - Corelan Team documentation\"","og_url":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2010-10-23T13:31:46+00:00","og_image":[{"url":"http:\/\/www.digiprove.com\/images\/dp_seal_trans_16x16.png","type":"","width":"","height":""}],"author":"Corelan Team (rick2600)","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/"},"author":{"name":"Corelan Team (rick2600)","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/ef393bec6a72a2d160e96dab55f69d1c"},"headline":"HaXx.Me #3 - Corelan Team documentation","datePublished":"2010-10-23T13:31:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/"},"wordCount":552,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/#primaryimage"},"thumbnailUrl":"http:\/\/www.digiprove.com\/images\/dp_seal_trans_16x16.png","keywords":["shellcode","corelan team"],"articleSection":["Security","Web Application Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/","url":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/","name":"HaXx.Me #3 - Corelan Team documentation - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/#primaryimage"},"thumbnailUrl":"http:\/\/www.digiprove.com\/images\/dp_seal_trans_16x16.png","datePublished":"2010-10-23T13:31:46+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/#primaryimage","url":"http:\/\/www.digiprove.com\/images\/dp_seal_trans_16x16.png","contentUrl":"http:\/\/www.digiprove.com\/images\/dp_seal_trans_16x16.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2010\/10\/23\/haxx-me-3-corelan-team-documentation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"HaXx.Me #3 &#8211; Corelan Team documentation"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/ef393bec6a72a2d160e96dab55f69d1c","name":"Corelan Team (rick2600)","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b4f5e46e857f06d9ed31ed3c1d37822183763d3293a394db74f8dddeb2893e8?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3b4f5e46e857f06d9ed31ed3c1d37822183763d3293a394db74f8dddeb2893e8?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b4f5e46e857f06d9ed31ed3c1d37822183763d3293a394db74f8dddeb2893e8?s=96&d=mm&r=x","caption":"Corelan Team (rick2600)"},"url":"https:\/\/www.corelan.be\/index.php\/author\/rick2600\/"}]}},"views":4247,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/5320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=5320"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/5320\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=5320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=5320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=5320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}