reverseProeasy

Signalization Two

spbctf

Task: a 64-bit Linux ELF registers a signal handler and then waits for input, hiding the flag path behind SIGINT. Solution: identify signal 2 as SIGINT, inspect the handler, and reconstruct the stack string after three intentional byte overwrites.

$ ls tags/ techniques/
static_analysisstack_string_reconstructionsignal_handler_analysis

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups

  • [reverse][Pro]task2.out— spbctf
  • [reverse][Pro]Basic— spbctf
  • [reverse][Pro]task4— spbctf
  • [reverse][Pro]Mic Check 10— spbctf
  • [reverse][Pro]Const— spbctf