reverseProeasy
Signalization Two
spbctf
Task: a 64-bit Linux ELF registers a signal handler and then waits for input, hiding the flag path behind SIGINT. Solution: identify signal 2 as SIGINT, inspect the handler, and reconstruct the stack string after three intentional byte overwrites.
$ ls tags/ techniques/
static_analysisstack_string_reconstructionsignal_handler_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]task2.out— spbctf
- [reverse][Pro]Basic— spbctf
- [reverse][Pro]task4— spbctf
- [reverse][Pro]Mic Check 10— spbctf
- [reverse][Pro]Const— spbctf