reverseeasy
task4
spbctf
Task: 32-bit ELF binary reads integer and calls it as function pointer. Solution: Find printflag address (0x0804867f = 134514303), enter it to trigger flag generation via modulo-indexed function table.
$ ls tags/ techniques/
static_analysisdisassemblyfunction_pointer_hijackmodulo_computation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]