pwnProeasy
fptr Reborn
spbctf
Task: No-PIE x86_64 binary reads 64 bytes into an 8-byte BSS buffer immediately followed by a function pointer and its argument, then performs an indirect call. Solution: craft a 24-byte payload that places '/bin/sh' in buf, overwrites function_pointer with the provided my_system helper (system(rdi)), and sets function_arg to the address of '/bin/sh', spawning a shell.
$ ls tags/ techniques/
function_pointer_overwritebss_buffer_overflowret2win_via_helper
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]fptr— spbctf
- [pwn][Pro]Baby bof— uoftctf2026
- [pwn][Pro]Canary leak + ret2win (string_leak)— spbctf
- [pwn][Pro]ret— spbctf
- [pwn][Pro]Taste— grodno_new_year_2026