pwnhard
Говори - и будет исполнено (ask_and_you_shall_receive)
hackerlab
Task: Binary with format string vulnerability (printf(user_input)) and buffer overflow (fgets reads 400 bytes into 112-byte buffer). No PIE, no canary, partial RELRO. Solution: Two-stage exploit - Stage 1 uses format string to leak libc address via puts@GOT, Stage 2 uses buffer overflow for ret2libc (system('/bin/sh')).
$ ls tags/ techniques/
format_string_writeformat_string_readret2libcgot_overwrite
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]