HITB-XCTF GSEC 2018 Quals: babypwn - Blind Format String Exploitation

from blog David Buchanan's Blog, | ↗ original
By David Buchanan, 13th April 2018 The only information provided with this challenge was an IP address and port number. No binaries to download! Of course, my first idea was to use netcat to see what it did. $ nc 47.75.182.113 9999 hello hello %08x 00000000 Typing hello just resulted in the same input being echoed back. There's only a limited number of possibilities for this kind of challenge, so I thought I'd check if...