pwnmedium

TicTacToed

hackthebox

Task: a Rust game binary hid a second-stage C2 interface behind a specific 5x5 tic-tac-toe pattern and access code. Solution: re-download the latest archive, recover the correct embedded ELF offsets, leak PIE with the H option, then use a use-after-free to overwrite a callback with getSecret and print the real remote flag.

$ ls tags/ techniques/
hidden_pattern_unlockpie_leak_via_function_pointeruse_after_free_callback_hijacktcache_reuse

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]