Skip to content

Commit

Permalink
Fix typo in solution
Browse files Browse the repository at this point in the history
  • Loading branch information
ZetaTwo committed Jun 25, 2023
1 parent 25a4d89 commit 54f15c5
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion 2023/pwn-write-flag-where/solution/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
In this task, we have a binary that, as we can deduce from its output, and confirm by reverse engineering, allows us to write the flag at any location in memory.

In the first version of the challenge, we are given the /proc/self/maps contents - so ASLR is not a problem.
The exploit is fairly simple - the binary will write the "Give me an address" message after every loop, and we can overwrite it flag, so that the server will send us the flag instead. Using gdb, we find the correct offset from the binary base, which we add to the one we get from the server:
The exploit is fairly simple - the binary will write the "Give me an address" message after every loop, and we can overwrite it with the flag, so that the server will send us the flag instead. Using gdb, we find the correct offset from the binary base, which we add to the one we get from the server:

```
$ nc localhost 1337
Expand Down

0 comments on commit 54f15c5

Please sign in to comment.