pwneasy
Easy Overflow 1
spbctf
Task: exploit a stack buffer overflow to overwrite a comparison variable checked by strcmp. Solution: send 264 bytes of padding followed by the target string "Yesss!" to overwrite the variable adjacent to the buffer on the stack.
$ ls tags/ techniques/
stack_buffer_overflowstrcmp_overwriteoffset_calculation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]