pwnProeasy
Auto Overflow 2
spbctf
Task: overflow a buffer to match a random integer comparison value generated with srand(time(0)). Solution: predict the rand() output by calling glibc srand/rand with the current Unix timestamp via ctypes, then send 64 bytes padding plus the predicted value in little-endian.
$ ls tags/ techniques/
random_number_predictiontime_based_seed_exploitationglibc_rand_reimplementation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]Auto Overflow 1— spbctf
- [pwn][Pro]Easy Overflow 3— spbctf
- [pwn][Pro]Sleep— spbctf
- [pwn][Pro]Easy Overflow 1— spbctf
- [pwn][Pro]sptr— spbctf