33C3 CTF binary challenge
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
Dockerfile
Makefile
README.md
babyfengshui
babyfengshui.c
build_docker.sh
exploit.py
flag.txt
run_docker.sh
start_server.sh
test.sh

README.md

babyfengshui

This was a pwnable worth 150 pts that I wrote for the 33C3CTF organised by Eat, Sleep, Pwn, Repeat

Every script used for the deployment of the challenge are included, you can just execute

make clean && make all
./build_docker.sh && ./run_docker.sh

and try out the exploit by running

python exploit.py local

Vulnerability (Spoilers)

The vulnerability in the binary is a custom overflow check which makes a wrong assumptions that two subsequent allocations on the heap will be placed next to each other