smoll but spooky

Again I didn't attempt this challenge, what a waste. Anyway's here's the description:

It mentions that there is a "bash". This hints that the /bin/sh string is present in the binary itself. Let us confirm this

Yep, that confirms it. Let's try looking at main()

We can notice 2 things here:

  1. system() is called from the library into the PLT (Procedure Linkage Table) meaning it has a system@plt entry in the ELF

  2. There is a Buffer Overflow here:

This is a good candidate for ret2system exploitation because we have the necessary components for it.

We have two options on building the script, we can do it manually or do a ROP chain. I will do both because it's fun muehehehe

Manual Script

Auto Script

Last updated