Hello I am Arsalan. Offensive Security Engineer, I blog about Cyber security, CTF writeup, Programming, Blockchain and more about tech. born and raised in indonesia, currently living in indonesia
this is a simple ret2libc attack
leak libc function, calculate to `system()` and `/bin/sh`
my exploit:
n0t so long | Rev
the flag is already in the binary file, so we can just collect all the string using ida
flag: 1nput_d035nt_p4s5_m4x_int39er
Phone | Rev
we can solve this challenge with the same approaches to the previous challenge, first i found this function
looks like this function will print out an `_` string, so this is the part of the flag, now we can just xref
this function
now we can just collect all the string from xref or we can use gdb to jump to the first function that print the flag