reverseProeasy
task4
spbctf
Task: 32-bit ELF binary reads integer and calls it as function pointer. Solution: Find printflag address (0x0804867f = 134514303), enter it to trigger flag generation via modulo-indexed function table.
$ ls tags/ techniques/
static_analysisdisassemblyfunction_pointer_hijackmodulo_computation
π
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]s4.outβ spbctf
- [reverse][Pro]task1.out (re2)β rev-kids20.forkbomb.ru
- [reverse][Pro]Signalization Twoβ spbctf
- [reverse][Pro]task2.outβ spbctf
- [pwn][Pro]ΠΠΎΠΏΡΠΎΡ (Question)β hackerlab