pwnProeasy
Easy Overflow 1
spbctf
Task: exploit a stack buffer overflow to overwrite a comparison variable checked by strcmp. Solution: send 264 bytes of padding followed by the target string "Yesss!" to overwrite the variable adjacent to the buffer on the stack.
$ ls tags/ techniques/
stack_buffer_overflowstrcmp_overwriteoffset_calculation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]Easy Overflow 3— spbctf
- [pwn][Pro]Auto Overflow 1— spbctf
- [pwn][Pro]Easy Overflow 2— spbctf
- [pwn][Pro]Cmd— spbctf
- [pwn][Pro]rbp— spbctf