bytebl33d Blog
  • Posts
  • GitHub
Powered by

Category: Binary-Exploitation

See all categories.

CTF • Binary-Exploitation
LakeCTF 2023 - Scream Into The Abyss

We are given the following files: Lets see what we are dealing with and list the protections that are enabled: Source code of main and save_msg functions. When we run the program and enter x, we get into the save_msg function that contains both a buffer overflow and format string vulnerability that we can exploit to execute system("/bin/sh") and read the flag on the file system.

2023-11-06

© Copyright 2026. All rights reserved.