stack6
Stack6
URL: https://exploit.education/protostar/stack-six/
Stack6 looks at what happens when you have restrictions on the return address.
This level can be done in a couple of ways, such as finding the duplicate of the payload ( objdump -s will help with this), or ret2libc , or even return orientated programming.
It is strongly suggested you experiment with multiple ways of getting your code to execute here.
This level is at /opt/protostar/bin/stack6
Source code
Writeup
Here we have to change the return address in order to get the shell
Steps to follow:
get the padding using offset method
get the system address using
p system
in GDBreturn to address of 41414141
get the
/bin/sh
address from libc lib
Exploit code
Solution:
Last updated