BM02 - 250pts
Last updated
Was this helpful?
Last updated
Was this helpful?
Download the file and find a way to get the flag. Contents: program
Challenge Files:
Running the program simply outputs I'm not going to make it that easy for you.
.
Decompiling the binary using Ghidra reveals a printFlag()
function that prints the flag if it is called with 0x539
as an argument.
printFlag
function:
We run the program using GDB and do the following:
Breakpoint at puts
: b puts
Run: r
Call printFlag
with the correct argument: call (char *) printFlag(0x539)
The flag is shown as Flag: patchItFixIt
.
patchItFixIt