slippery-shellcode
Problem
This program is a little bit more tricky. Can you spawn a shell and use that to read the flag.txt? You can find the program in /problems/slippery-shellcode_5_5cea4ae04c57923484bda350da9f4015 on the shell server. Source.
Solution
Get some quality shellcode from ShellStorm
I used
Linux/x86 - execve(/bin/bash, [/bin/sh, -p], NULL) - 33 bytes by Jonathan Salwan
at http://shell-storm.org/shellcode/files/shellcode-606.phpThe buffer is 512 bytes so buffer_size-payload_size=no_op_sled_size:
512-33=479
Create payload
Run
cat flag.txt
Flag
picoCTF{sl1pp3ry_sh311c0d3_ecc37b22}
Last updated