GNU/Linux ◆ xterm-256color ◆ zsh 447 views

This is my first attempt of buffer overflow! I’ve been very interested in binary exploits and I found this task on GCI that I can start studying buffer overflow!

First, I try different lengths to reach the return pointer, which is 264 bytes after the start of the buffer. Then, I put a nopslide in the beginning and then the 24 bytes shellcode that executes /bin/sh, and finally, overwrite the return pointer to the nopslide to slide into the shellcode!

Actually, I’ve learned a lot from this experience: Use python2, as python3’s print function have special encodings, and don’t put the shellcode too close to $rsp or it may corrupt itself