Protostar Stack4

The application is a super simple buffer overflow. The c code is only a few lines. The objective is to change the return address to the win function. C Code #include <stdlib.h> #include <unistd.h> #include <stdio.h> #include <string.h>…

75 CTF.HackUCF.org Mem_Test

We are given a binary, and running the application gives us the following output after entering aaaa ------Test Your Memory!------- 8bGyUdjA5Z I know that mine is fine...see? : 0x8048980 Let's see how good your memory is... >aaa sorry, your memory sucks So straight away it seems like we…

200 WCSCCTF Jumpy

This challenge was two parts, the first part was overflowing the buffer of size, and the second part was overwriting the return address with the address of winrar. Since there was no alsr and we are given the binary, the address can be hard coded. The size needed to prime…

100 WCSCCTF Too Easy

This one as the name suggests, was incredibly easy and honestly probably worth too many points, but here's a writeup regardless. So we are given a binary tooEasy and was told that | Challenge by: nullp0inter | This one is almost too easy, get the flag! | nc wcscctf.org 8383 Opening up…

200 CSAW2016 Tutorial

Running the application there is immediately a seg fault. λ ./tutorial Segmentation fault (core dumped) Open in ida to see whats going on. void __fastcall __noreturn main(__int64 a1, char **a2, char **a3){ v15 = *MK_FP(__FS__, 40LL); optval = 1; sigemptyset(&v4); fd = socket(2, 1, 0); if ( fd…