Classic Bufferoverflow
Last updated
Last updated
I think this is the trickiest challenge I have ever faced.
When i run the program, it will show something like ltrace
or strace
command.
First of all when facing a buffer overflow challenge, find the offset which for this challenge is 40 bytes.
Next, I went through the code using gdb-gef
and I found 3 functions, main
, getFlag
and getInput
.
The target is the function getFlag
, obviously to give me the flag. So, i get the address of the function which is 0x00000000004011d6
and use the same technique in challenge Don't Overboard 2.
So, i made a simple script to ease my life
Just run it and the flag is already served.
CURTIN_CTF{B4S1C_0V3RF10W}
Better luck next time!
did not printed in the image below means that we hit the offset value