pwnProeasy
secret_v2 — format string without %n
spbctf
Task: format-string bug with a filter that bans the byte 'n' (so no %n) but still allows %s; secret is stored in BSS at a fixed No-PIE address and later compared against user input. Solution: plant the secret's address on the stack by placing it inside the input buffer and dereference it with %11$s to leak the secret, then echo the secret back to retrieve the flag.
$ ls tags/ techniques/
format_string_s_readstack_pointer_plantingprintf_leak_at_fixed_address
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]Говори - и будет исполнено (ask_and_you_shall_receive)— hackerlab
- [pwn][Pro]rbp— spbctf
- [pwn][Pro]Canary leak + ret2win (string_leak)— spbctf
- [pwn][Pro]Birdy— spbctf
- [pwn][Pro]Indexes— spbctf