Can you help me climb the rope?
nc cha.hackpack.club 41702
Files: repo
Analysis
Binary info:
Decompiling main reveals stack overflow vulnerability.
We can overwrite return address by sending 40 + 8
bytes. First we want to leak libc address. We can achieve this by leaking puts@got
.
Checking out leaked puts
address on libc database shows that on the target system libc6_2.27-3ubuntu1_amd64.so
is used.
Once we know what libc is used and what is puts
address we can send final payload that exploits service.
Full exploit