PicoCTF-2022 Writeup
Search
⌃
K
PicoCTF-2022 Writeup
Search
⌃
K
README
Binary Exploitation
buffer overflow 1
buffer overflow 2
buffer overflow 3
flag leak
function overwrite
ropfu
stack cache
x-sixty-what
Cryptography
basic-mod1
basic-mod2
diffie-hellman
morse-code
NSA Backdoor
Sequences
substitution
Sum-O-Primes
Very Smooth
Forensics
Operation Oni
Operation Orchid
SideChannel
St3g0
Torrent Analyze
Reverse Engineering
Bbbbloat
Keygenme
unpackme
Wizardlike
Web Exploitation
Forbidden Paths
noted
Roboto Sans
SQLiLite
Powered By
GitBook
stack cache
Challenge
Undefined behaviours are fun. It looks like Dr. Oswal allowed buffer overflows again. Analyse this
program
to identify how you can get to the flag. You can view source
here
. And connect with it using
nc saturn.picoctf.net 63957
Solution
Please see the solution
script.py
.
Flag
picoCTF{Cle4N_uP_M3m0rY_8d5089b9}
Binary Exploitation - Previous
ropfu
Next - Binary Exploitation
x-sixty-what
Last modified
1yr ago