PicoCTF-2022 Writeup
  • README
  • Binary Exploitation
    • buffer overflow 1
    • buffer overflow 2
    • buffer overflow 3
    • flag leak
    • function overwrite
    • ropfu
    • stack cache
    • x-sixty-what
  • Cryptography
    • basic-mod1
    • basic-mod2
    • diffie-hellman
    • morse-code
    • NSA Backdoor
    • Sequences
    • substitution
    • Sum-O-Primes
    • Very Smooth
  • Forensics
    • Operation Oni
    • Operation Orchid
    • SideChannel
    • St3g0
    • Torrent Analyze
  • Reverse Engineering
    • Bbbbloat
    • Keygenme
    • unpackme
    • Wizardlike
  • Web Exploitation
    • Forbidden Paths
    • noted
    • Roboto Sans
    • SQLiLite
Powered by GitBook
On this page
  • Challenge
  • Solution
  • Flag

Was this helpful?

Edit on GitHub
  1. Binary Exploitation

buffer overflow 2

Previousbuffer overflow 1Nextbuffer overflow 3

Last updated 3 years ago

Was this helpful?

Challenge

Control the return address and arguments This time you'll need to control the arguments to the function you return to! Can you get the flag from this ? You can view source . And connect with it using nc saturn.picoctf.net 50541

Solution

This challenge is almost identical to from PicoCTF 2019. However, we use ROP for this exploit since it is easy with . Alternatively, the method from the link above should work too.

Flag

picoCTF{argum3nt5_4_d4yZ_b3fd8f66}

program
here
OverFlow 2
pwntools