pwnmedium

New year party

grodno_new_year_2026

Task: Binary that allocates RWX memory via mmap, copies user input with strcpy, and executes it as code. Solution: Sent a null-byte-free execve("/bin//sh") shellcode that bypasses the strcpy null terminator restriction, obtained a shell, and ran /bin/newyear to get the flag.

$ ls tags/ techniques/
shellcode_injectionrwx_memory_execution

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]