pwnPromedium
Hospital (Больница)
duckerz
Task: PWN binary with PIE enabled, no canary, and executable stack (RWX). Solution: Leak PIE base via info function, use ret2reg technique with jmp rsi gadget to execute shellcode in the buffer.
$ ls tags/ techniques/
shellcode_injectionpie_leakjmp_rsiret2reg
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]Luxury (Люкс)— duckerz
- [pwn][Pro]Easy ROP— hackerlab
- [pwn][Pro]В отеле (At the Hotel)— duckerz
- [pwn][Pro]Говори - и будет исполнено (ask_and_you_shall_receive)— hackerlab
- [pwn][Pro]Древний замок мага (Ancient Magician Castle)— duckerz