pwnPromedium

New year party

grodno_new_year_2026

Task: Binary that allocates RWX memory via mmap, copies user input with strcpy, and executes it as code. Solution: Sent a null-byte-free execve("/bin//sh") shellcode that bypasses the strcpy null terminator restriction, obtained a shell, and ran /bin/newyear to get the flag.

$ ls tags/ techniques/
shellcode_injectionrwx_memory_execution

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups

  • [pwn][Pro]Taste— grodno_new_year_2026
  • [pwn][Pro]New year show— grodno_new_year_2026
  • [reverse][Pro]Happy New Year— grodno_new_year_2026
  • [pwn][Pro]Secrets— grodno_new_year_2026
  • [pwn][Pro]Name— grodno_new_year_2026