pwneasy
Labyrinth
hackthebox
Task: Exploit a buffer overflow in a 64-bit binary with a win function that reads flag.txt. Solution: Select door 69 to reach the vulnerable code path, overflow a 48-byte buffer with 68-byte fgets to overwrite the return address at offset 56, use a ret gadget for x86-64 stack alignment, then jump to the escape_plan function.
$ ls tags/ techniques/
stack_alignmentret2winbuffer_overflowreturn_address_overwrite
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]