pwneasy

Easy Overflow 1

spbctf

Task: exploit a stack buffer overflow to overwrite a comparison variable checked by strcmp. Solution: send 264 bytes of padding followed by the target string "Yesss!" to overwrite the variable adjacent to the buffer on the stack.

$ ls tags/ techniques/
stack_buffer_overflowstrcmp_overwriteoffset_calculation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]