- Published on
Sample CTF — writeup placeholder
NOTE
This is a placeholder writeup.
Challenge
Category: pwn — Difficulty: medium
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Recon
$ checksec ./challenge
[*] '/path/to/challenge'
Arch: amd64-64-little
RELRO: Full RELRO
Stack: No canary found
NX: NX enabled
PIE: No PIE
Vulnerability
Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Exploit
from pwn import *
# placeholder
io = process('./challenge')
io.sendline(b'A' * 0x100)
io.interactive()
Flag
flag{placeholder}
Take-away
Excepteur sint occaecat cupidatat non proident.