pwnPromedium
Birdy
spbctf
Task: guess an 8-byte secret value on a fork-based server where the secret persists across connections. Solution: brute-force the secret byte-by-byte using partial reads — send N bytes and detect correct guesses from server responses, then send the full secret with print_flag=1.
$ ls tags/ techniques/
byte_by_byte_brute_forcepartial_read_exploitationfork_based_server_persistence
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]Канарейка (Canary)— HackerLab
- [pwn][Pro]secret_v2 — format string without %n— spbctf
- [pwn][Pro]stackgift— spbctf
- [pwn][Pro]Easy Overflow 3— spbctf
- [pwn][Pro]ret— spbctf