pwnhard

Говори - и будет исполнено (ask_and_you_shall_receive)

hackerlab

Task: Binary with format string vulnerability (printf(user_input)) and buffer overflow (fgets reads 400 bytes into 112-byte buffer). No PIE, no canary, partial RELRO. Solution: Two-stage exploit - Stage 1 uses format string to leak libc address via puts@GOT, Stage 2 uses buffer overflow for ret2libc (system('/bin/sh')).

$ ls tags/ techniques/
format_string_writeformat_string_readret2libcgot_overwrite

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]