pwnProeasy
Auto Overflow 1
spbctf
Task: overflow a buffer to match a dynamically generated target string for strcmp comparison. Solution: parse the target string from server output, then send 64 bytes of padding plus the target string to overwrite the comparison variable via gets().
$ ls tags/ techniques/
gets_exploitationautomated_overflowdynamic_target_parsing
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]Easy Overflow 1— spbctf
- [pwn][Pro]Auto Overflow 2— spbctf
- [pwn][Pro]Easy Overflow 3— spbctf
- [pwn][Pro]sptr— spbctf
- [pwn][Pro]Cmd— spbctf