pwnProeasy

Mic Check — getflag

spbctf

Task: trivial shellcode runner that mmaps an RWX page, reads up to 0x400 bytes of input, copies them in and calls them; goal is to exec /bin/getflag. Solution: 34-byte amd64 shellcode that pushes the string '/bin/getflag\\0' on the stack and calls execve via syscall 59.

$ ls tags/ techniques/
stack_string_buildexecve_shellcoderaw_syscall

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups