CSAWCTF_2017: Pilot

Category: Pwn Points: 75 Description:

Can I take your order nc pwn.chal.csaw.io 8464 16:05 Eastern: Updated binary

Write-up

This challenge is a standard buffer overflow, return to shellcode exploit, where the address is fed to you. This is made even simpler through Python.

# ./solve.py [+] Opening connection to pwn.chal.csaw.io on port 8464: Done [*] Switching to interactive mode [*]Command: $ ls flag pilot $ cat flag flag{1nput_c00rd1nat3s_Strap_y0urse1v3s_1n_b0ys}

Therefore, the flag is flag{1nput_c00rd1nat3s_Strap_y0urse1v3s_1n_b0ys}.