Official discussion thread for Execute. Please do not post any spoilers or big hints.
The website always returns :
Hey, just because I am hungry doesn’t mean I’ll execute everything
Hehe, told you… won’t accept everything
at the same time, sometimes only returns :
Hey, just because I am hungry doesn’t mean I’ll execute everything
I am looking for a way to inject some kind of input, but cannot do that
Use netcat (nc IP PORT
)
Hmm, Although this yields no stdout/stderr right? Is there a way to get this somehow?
I would take a look at the additional content you can download. Without this, this challenge might become very hard….
I tried analysis additional file and inject some kind of input but I still cannot resolve it.
I need some help for resolve it. thanks
Trying to figure out if there are any encoders that I can use to avoid the bad chars… but haven’t found anything yet. Well, nothing with a short enough payload.
Nice challenge. I don’t think this is easy. But maybe that is because writing shellcode is not one of my specialties…
it took me a while to figure out the ENOTTY error…
then I went for another approach
the most difficult part was to fit the shellcode into 60 bytes… but yeah the experience was great…
a suggestion? don’t go for automated tools… embrace the experience of handcrafting your own shellcode…
can you explain what to do? I am new doing pwn, I don’t understand nothing.
The only way I could get it to work was with python and pwntools. Piping through stdin via printf or echo or via a payload file will not exit the execution, but nothing is returned. Testing locally this way will promptly exit the program without a segmentation fault.
Same here I can return the flag locally but not over netcat. I even tried curling the flag to myself to no avail.
A very old trick:
(cat payload; cat) | ./execute
Same trick for nc.
Also, don’t bother with automated tools, write your own shellcode. It’s good exercise.