Hacking TMNF: Part 2 - Exploiting a blind format string
Common Information
Type Value
UUID e56e3c21-c9f5-4cd2-b359-8ee5d6aa4991
Fingerprint ae125070ae023ad5
Analysis status DONE
Considered CTI value 0
Text language
Published Oct. 5, 2022, 3 p.m.
Added to db Feb. 17, 2023, 9:53 p.m.
Last updated Nov. 17, 2024, 5:57 p.m.
Headline Hacking TMNF: Part 2 - Exploiting a blind format string
Title Hacking TMNF: Part 2 - Exploiting a blind format string
Detected Hints/Tags/Attributes 56/1/12
Attributes
Details Type #Events CTI Value
Details Domain 25
log.info
Details Domain 1
rop.call
Details Domain 132
www.exploit-db.com
Details Domain 1373
twitter.com
Details File 1
trackmaniaserver.exe
Details File 1
trackmania.exe
Details File 25
log.inf
Details File 14
context.bin
Details File 5
constants.sys
Details File 2
rop.raw
Details Url 1
https://www.exploit-db.com/exploits/34060
Details Url 1
https://twitter.com/gf_256/status/1430961241644732416