pwnPromedium
New year party
grodno_new_year_2026
Task: Binary that allocates RWX memory via mmap, copies user input with strcpy, and executes it as code. Solution: Sent a null-byte-free execve("/bin//sh") shellcode that bypasses the strcpy null terminator restriction, obtained a shell, and ran /bin/newyear to get the flag.
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]Taste— grodno_new_year_2026
- [pwn][Pro]New year show— grodno_new_year_2026
- [reverse][Pro]Happy New Year— grodno_new_year_2026
- [pwn][Pro]Secrets— grodno_new_year_2026
- [pwn][Pro]Name— grodno_new_year_2026