pwnProeasy
Taste
grodno_new_year_2026
Task: Binary that allocates a 16-byte name buffer and an adjacent 8-byte check structure on the heap, reading 100 bytes into the name. Solution: Overflowed the heap buffer with 36 bytes of padding to reach the check structure's field2, then wrote 0xdeadbeef to pass the magic value comparison and trigger flag printing.
$ ls tags/ techniques/
heap_buffer_overflowchunk_layout_analysisstructure_overwrite
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]New year party— grodno_new_year_2026
- [pwn][free]Getting Started— hackthebox
- [pwn][Pro]Secrets— grodno_new_year_2026
- [pwn][free]Regularity— hackthebox
- [pwn][free]priority-queue— b01lersc