pwnProeasy
Вопрос (Question)
hackerlab
Task: Binary checks for correct answer to get flag. Solution: Buffer overflow via gets() to overwrite adjacent secret variable with magic value 0x50574E21.
$ ls tags/ techniques/
elf64static_analysisbuffer_overflowstack_overflowvariable_overwritemagic_valueobjdumpbss_segmentlittle_endian
Magic value comparison bypassStatic binary analysis with objdumpBuffer overflow to overwrite adjacent global variableLittle-endian byte order exploitation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]0xLEET— hackerlab
- [pwn][Pro]Simple BOF: Вредный пингвин— hackerlab
- [pwn][Pro]Странный PWN?— hackerlab
- [pwn][Pro]Вход не для всех (Entry is not for everyone)— hackerlab
- [pwn][Pro]Easy Overflow 3— spbctf