pwnProhard

Bottoms Up

miptctf

Custom stack-based VM with 32-bit stack pointer. POP has no underflow check, allowing 2^32 wraparound to write past stack bounds. Exploit leaks PIE/libc, bypasses canary by skipping check, builds ROP chain for system("/bin/sh").

$ ls tags/ techniques/
pie_leakvm_stack_underflow32bit_integer_wraparoundrop_chain_constructionlibc_leakcanary_bypass_via_return_skip

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups

  • [pwn][free]Regularity— hackthebox
  • [pwn][Pro]login— volgactf
  • [pwn][free]Portaloo— hackthebox
  • [pwn][free]Void— hackthebox
  • [pwn][free]Evil Corp— hackthebox