In this post I decided to describe a quick way to exploit both overflow challenges from PicoCTF 2014. Below you will find the details. Here we go...
We will start here - overflow-1:
Looks like a pretty quick case. If we can set a value of the secret to c0deface - we will run a give_shell() function with bash. Let's try :)
...and it's done. :)
Checking next case - overflow-2. We are here:
Similar bug but this time we need to know the address of give_shell() function:
I used this address in my input-file (called 114 this time, see below):
Good! We have a shell. :] Let's try the same outside gdb:
Great, both cases solved. :)
See you next time!
Cheers
Brak komentarzy:
Prześlij komentarz