reverseeasy

task4

spbctf

Task: 32-bit ELF binary reads integer and calls it as function pointer. Solution: Find printflag address (0x0804867f = 134514303), enter it to trigger flag generation via modulo-indexed function table.

$ ls tags/ techniques/
static_analysisdisassemblyfunction_pointer_hijackmodulo_computation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]