pwnmedium
Closed Party
hackerlab
Task: stripped PIE ELF64 with Full RELRO, NX, no canary exposes a format string in the name prompt and a 16-byte buffer overflow in the answer prompt; .data contains a fake flag with C0DEBY. Solution: leak the return address at sequential %p position 47 to recover PIE base, then overflow the answer buffer to redirect execution to the flag-printing code at PIE_base+0x14ec.
$ ls tags/ techniques/
pie_base_recoveryret_to_winsequential_format_string_leakbuffer_overflow_ret_overwrite
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]