Official Execute Discussion

Official discussion thread for Execute. Please do not post any spoilers or big hints.

The website always returns :
Hey, just because I am hungry doesn’t mean I’ll execute everything
Hehe, told you… won’t accept everything

at the same time, sometimes only returns :
Hey, just because I am hungry doesn’t mean I’ll execute everything

I am looking for a way to inject some kind of input, but cannot do that

Use netcat (nc IP PORT)

1 Like

Hmm, Although this yields no stdout/stderr right? Is there a way to get this somehow?

I would take a look at the additional content you can download. Without this, this challenge might become very hard….

1 Like

I tried analysis additional file and inject some kind of input but I still cannot resolve it.
I need some help for resolve it. thanks

1 Like

Trying to figure out if there are any encoders that I can use to avoid the bad chars… but haven’t found anything yet. Well, nothing with a short enough payload.

1 Like

Nice challenge. I don’t think this is easy. But maybe that is because writing shellcode is not one of my specialties…

it took me a while to figure out the ENOTTY error…
then I went for another approach

the most difficult part was to fit the shellcode into 60 bytes… but yeah the experience was great…

a suggestion? don’t go for automated tools… embrace the experience of handcrafting your own shellcode…

2 Likes

can you explain what to do? I am new doing pwn, I don’t understand nothing.

1 Like

The only way I could get it to work was with python and pwntools. Piping through stdin via printf or echo or via a payload file will not exit the execution, but nothing is returned. Testing locally this way will promptly exit the program without a segmentation fault.

Same here I can return the flag locally but not over netcat. I even tried curling the flag to myself to no avail.

A very old trick:

(cat payload; cat) | ./execute

Same trick for nc.

Also, don’t bother with automated tools, write your own shellcode. It’s good exercise.