wtorek, 20 sierpnia 2019

blind_fmt_stack challenge

Below we'll check another challenge from CTF games I found somewhere on the github. This time we will try to solve blind_fmt_stack challenge. Here we go...
Challenge looks like this:


Let's open the file in gdb: (pdisasm main with gdb-peda installed):


Then I started the program:


As you can see there is a nice hint :) So let's try to leak some values now:

Let's extend the number of "%x.":

Now we'll change the format specifier:


Great! Looks like we got the flag! :)

See you next time!


Cheers




Brak komentarzy:

Prześlij komentarz