d3lu0.
Published on

Sample CTF — writeup placeholder

NOTE

This is a placeholder writeup.

Challenge

Category: pwn — Difficulty: medium

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Recon

$ checksec ./challenge
[*] '/path/to/challenge'
    Arch:     amd64-64-little
    RELRO:    Full RELRO
    Stack:    No canary found
    NX:       NX enabled
    PIE:      No PIE

Vulnerability

Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Exploit

from pwn import *

# placeholder
io = process('./challenge')
io.sendline(b'A' * 0x100)
io.interactive()

Flag

flag{placeholder}

Take-away

Excepteur sint occaecat cupidatat non proident.