poniedziałek, 14 października 2019

PicoCTF 2014 - both overflow challenges

In this post I decided to describe a quick way to exploit both overflow challenges from PicoCTF 2014. Below you will find the details. Here we go...
We will start here - overflow-1:

Looks like a pretty quick case. If we can set a value of the secret to c0deface - we will run a give_shell() function with bash. Let's try :)

...and it's done. :)

Checking next case - overflow-2. We are here:


Similar bug but this time we need to know the address of give_shell() function:


I used this address in my input-file (called 114 this time, see below):


Good! We have a shell. :] Let's try the same outside gdb:


Great, both cases solved. :)

See you next time!

Cheers




Brak komentarzy:

Prześlij komentarz