this was the first of two challenges in the gunnhacks 7.0 ctf; the bug is a buffer overflow, with aslr, nx, and stack protection disabled. also it's stripped and the section headers are a bit fucked up >:). it's statically linked, and does not have libc.
the lemons have revolted in the lemon gallery due to abysmal working conditions and forced labour. they've put up a blockade which seems almost inpenetrable; i can't even find the libc version! connect with
nc shell.ctf.gunnhacks.com 45753
.
we can run pwn checksec
to get an idea of what security features the binary has:
alright. if we can overflow a buffer, we might be able to jump straight to our shellcode. let's take a look in gdb (using
starti
to immediately break when the program starts).
![disassembly](https://chop0.i