slippery-shellcode
Last updated
Was this helpful?
Last updated
Was this helpful?
This program is a little bit more tricky. Can you spawn a shell and use that to read the flag.txt? You can find the program in /problems/slippery-shellcode_5_5cea4ae04c57923484bda350da9f4015 on the shell server. Source.
Get some quality shellcode from
I used Linux/x86 - execve(/bin/bash, [/bin/sh, -p], NULL) - 33 bytes by Jonathan Salwan
at
The buffer is 512 bytes so buffer_size-payload_size=no_op_sled_size: 512-33=479
Create payload
Run cat flag.txt
picoCTF{sl1pp3ry_sh311c0d3_ecc37b22}