PicoCTF-2022 Writeup
  • README
  • Binary Exploitation
    • buffer overflow 1
    • buffer overflow 2
    • buffer overflow 3
    • flag leak
    • function overwrite
    • ropfu
    • stack cache
    • x-sixty-what
  • Cryptography
    • basic-mod1
    • basic-mod2
    • diffie-hellman
    • morse-code
    • NSA Backdoor
    • Sequences
    • substitution
    • Sum-O-Primes
    • Very Smooth
  • Forensics
    • Operation Oni
    • Operation Orchid
    • SideChannel
    • St3g0
    • Torrent Analyze
  • Reverse Engineering
    • Bbbbloat
    • Keygenme
    • unpackme
    • Wizardlike
  • Web Exploitation
    • Forbidden Paths
    • noted
    • Roboto Sans
    • SQLiLite
Powered by GitBook
On this page
  • Challenge
  • Solution
  • Flag

Was this helpful?

Edit on GitHub
  1. Binary Exploitation

stack cache

PreviousropfuNextx-sixty-what

Last updated 3 years ago

Was this helpful?

Challenge

Undefined behaviours are fun. It looks like Dr. Oswal allowed buffer overflows again. Analyse this to identify how you can get to the flag. You can view source . And connect with it using nc saturn.picoctf.net 63957

Solution

Please see the solution .

Flag

picoCTF{Cle4N_uP_M3m0rY_8d5089b9}

program
here
script.py