An homage to pwny.racing, we present… speedrun pwn challenges. These bite-sized challenges should serve as a nice warm-up for your pwning skills.
Files: repo
Analysis
Binary info:
Challenge was about exploiting format string vulnerabilty. Data is read from stdin into buffer and then directly passed to printf
function.
With first payload we want to leak libc address and jump back to main to send another payload that will spawn /bin/sh
.
Once the libc address is known we want to overwrite printf
with address of system
.
Sending "/bin/sh"
will execute system("/bin/sh")
.
Full exploit