reverseProeasy

task4

spbctf

Task: 32-bit ELF binary reads integer and calls it as function pointer. Solution: Find printflag address (0x0804867f = 134514303), enter it to trigger flag generation via modulo-indexed function table.

$ ls tags/ techniques/
static_analysisdisassemblyfunction_pointer_hijackmodulo_computation

πŸ”’

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups