poniedziałek, 19 sierpnia 2019

PicoCTF 2013 - overflow4

This time we will check overflow4 challenge. Let's do it...
Checking source:

Next I decided to move from Kali VM to Protostar VM. I used scp to copy the binary:


We are again in gdb: set a breakpoint in the end of the vuln() function and run our payload:

Just like during Protostar - stack6 - we will use ret2libc to takeover this program:


Updating the poc.py:


Working code:


Cool :)


See you next time!

Cheers


Brak komentarzy:

Prześlij komentarz