RIP my bof
30 points Easy

Okay so we have a bof, can we get it to redirect IP (instruction pointer) to something else?

If you get stuck liveoverflow covers you again!

nc thekidofarcrania.com 4902

simple-rip.tar.gz
Flag
Rating 4.81
5
4
3
2
1

Discussion

Protected
0
Protected
0

Very practical for a beginner, THANKS. #hint: replace the 'return address' with the 'win()' function address. (you can find it using any debugger as 'gdb' is), then using python2 to inject it (or overflow it) into the binary. (Ensure the address is in 'raw binary' value !).

1

Basically it is similar to RET2WIN attack as we have to overwrite the return address with the address of win function...hence we'll get the flag :)

0

GOOD

0

fuck python3

1

It happened to me that the address box returns: 8b 86 04 08, when in reality it is: 86 85 04 08, for this reason I could not find the flag, it always returned the message: "timeout: the monitored command dumped core"

0

CTFlearn{c0ntr0ling_r1p_1s_n0t_t00_h4rd_abjkdlfa}

-13

have some guides?

0

goodthings

0

Took me an entire day! I was looking ebx which I correctly overrided with the win address. That's not the crux of solving this and I wasted time wondering why. After almost a day, it dawned on me to also look at the buff visualisation and realised I haven't overflowed enough to reach the return address. And last but not least, I was wondering why gdb run told me that flag.txt was not found and then realised I need to redurect my python exploit file into the server version because the flag file is on the server, not locally.

0