pwnPromedium
Storage
spbctf
Task: Binary pwn challenge with key-value storage service. Solution: Exploited buffer overflow in fgets() to overwrite getcwd() result on stack, then triggered command injection via system() call in list command using append mode to build payload across multiple writes.
$ ls tags/ techniques/
command_injectionelf64buffer_overflowpiecanary_bypassstack_variable_overwritefgets_overflowappend_modesystem_call
stack_buffer_overflowcwd_overwritecommand_injection_via_systemappend_mode_payload_building
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]secret_v2 — format string without %n— spbctf
- [pwn][Pro]Говори - и будет исполнено (ask_and_you_shall_receive)— hackerlab
- [pwn][Pro]fptr Reborn— spbctf
- [pwn][Pro]Странный PWN?— hackerlab
- [pwn][Pro]Древний замок мага (Ancient Magician Castle)— duckerz