pwnProeasy
Mic Check — getflag
spbctf
Task: trivial shellcode runner that mmaps an RWX page, reads up to 0x400 bytes of input, copies them in and calls them; goal is to exec /bin/getflag. Solution: 34-byte amd64 shellcode that pushes the string '/bin/getflag\\0' on the stack and calls execve via syscall 59.
$ ls tags/ techniques/
stack_string_buildexecve_shellcoderaw_syscall
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]cat /flag under seccomp— spbctf
- [pwn][Pro]read_me_not — sendfile bypass— spbctf
- [pwn][Pro]shellco — null-free XOR-halved shellcode— spbctf
- [reverse][Pro]Mic Check 10— spbctf
- [pwn][free]Execute (pwn_execute)— hackthebox