pwnProeasy

Auto Overflow 1

spbctf

Task: overflow a buffer to match a dynamically generated target string for strcmp comparison. Solution: parse the target string from server output, then send 64 bytes of padding plus the target string to overwrite the comparison variable via gets().

$ ls tags/ techniques/
gets_exploitationautomated_overflowdynamic_target_parsing

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups