Hacktoday IPB 2020 CTF final
Published on 06 Sep 2020
Writeup Hacktoday IPB 2020 CTF final
after a week, my team (glut0r) was qualified to compete in the final
confusing stack
Solve:
Elf Information:
./confusing-stack: ELF 64-bit LSB executable, x86-64, version 1 (SYSV),
statically linked, stripped
Elf Protection:
Arch: amd64-64-little
RELRO: No RELRO
Stack: No canary found
NX: NX enabled
PIE: No PIE (0x400000)
i assume this binary is written in assembly, so i open it in binary ninja
we can control some register including %rbx
, %rcx
, %rdx
from our first
input.
we can also control %rax
from length of our second input. after doing some blackbox,
i figure out that we can set %rax
to 0xb to call execve
(x86 syscall), and this is my exploit:
and we got a shell