poniedziałek, 19 sierpnia 2019

PicoCTF 2013 - overflow4

This time we will check overflow4 challenge. Let's do it...
Checking source:

Next I decided to move from Kali VM to Protostar VM. I used scp to copy the binary:

We are again in gdb: set a breakpoint in the end of the vuln() function and run our payload:

Just like during Protostar - stack6 - we will use ret2libc to takeover this program:

Updating the poc.py:

Working code:

Cool :)

See you next time!


Brak komentarzy:

Prześlij komentarz