pwnmedium
login
volgactf
Task: 32-bit static ELF assembly binary with stack buffer overflow (64-byte buffer, 128-byte read) and hidden gadgets in dead code. Solution: Two-stage exploit using iret to switch from 32-bit compat to 64-bit long mode, then SROP (Sigreturn-Oriented Programming) to set all registers and execve(\"/bin/sh\").
$ ls tags/ techniques/
buffer_overflowstack_overflowx86_64ropsropsigreturnsyscallstatic_binaryx86assemblyiret32_to_64_bithidden_gadgets
stack_buffer_overflowstack_pivothidden_gadget_discoveryiret_mode_switchsrop_sigreturn_oriented_programmingexecve_via_sigreturn_frametwo_stage_payload
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]