pwneasy

Labyrinth

hackthebox

Task: Exploit a buffer overflow in a 64-bit binary with a win function that reads flag.txt. Solution: Select door 69 to reach the vulnerable code path, overflow a 48-byte buffer with 68-byte fgets to overwrite the return address at offset 56, use a ret gadget for x86-64 stack alignment, then jump to the escape_plan function.

$ ls tags/ techniques/
stack_alignmentret2winbuffer_overflowreturn_address_overwrite

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]