pwnPromedium
stackgift
spbctf
Task: Stack canary bypass via leak. Binary dumps 128 bytes of stack memory including the canary. Solution: Extract canary from stack dump at offset 0x28, build payload with correct canary to bypass __stack_chk_fail, then ret2win.
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]Canary leak + ret2win (string_leak)— spbctf
- [pwn][Pro]ret— spbctf
- [pwn][Pro]rbp— spbctf
- [pwn][Pro]fptr— spbctf
- [pwn][Pro]sptr— spbctf