This time we will check overflow4 challenge. Let's do it...
Checking source:
Next I decided to move from Kali VM to Protostar VM. I used scp to copy the binary:
We are again in gdb: set a breakpoint in the end of the vuln() function and run our payload:
Just like during Protostar - stack6 - we will use ret2libc to takeover this program:
Updating the poc.py:
Working code:
Cool :)
See you next time!
Cheers
Brak komentarzy:
Prześlij komentarz