BM02 - 250pts
Briefing
Download the file and find a way to get the flag. Contents: program
Challenge Files:
Solution
Running the program simply outputs
I'm not going to make it that easy for you.
.Decompiling the binary using Ghidra reveals a
printFlag()
function that prints the flag if it is called with0x539
as an argument.printFlag
function:We run the program using GDB and do the following:
Breakpoint at
puts
:b puts
Run:
r
Call
printFlag
with the correct argument:call (char *) printFlag(0x539)
The flag is shown as
Flag: patchItFixIt
.
Flag
patchItFixIt
Last updated