Skip to main content

flag

There is no source code this time. I downloaded the code and then ran it:

They mention that they use strcpy, which means that the string will be copied from one location to another. This means we might be able to find the string during transit from one register to another. I ran strings on the file to see if there was anything interesting, and I found this:

I unpacked the flag file:

I then ran the code with gdb, and made a breakpoint at main. Then I just kept going line by line (by entering "next") until I saw something interesting in the registers:

This had a pwnable.kr flag feel to it, so I entered it, and this was the flag. I want to see if I can get the flag using Cutter as well. You could technically find this by looking through all the strings in the file in Cutter: