Forum Discussion
C++ Stack Overflow Purple Belt
Hello Community,
I am stuck on Exploitation Development: Stack Overflow Part 2 lab.
I have already determined how many characters are needed to overwrite the return address and also the location of win function.
But I have not been able to construct the payload to enter it into the program to capture the flag. If someone could give some advise on this. It would be very appreciated.
Best Regards
2 Replies
- MadelineDadamio
Community Support
Hi Octavio I wanted to check with you to see if this is helpful: combine your offset-sized filler with the win address encoded little-endian, emit the raw bytes (Python works), and pipe them into the binary to trigger the flag.
- SamDickison
Community Manager
Hi Octavio, I've seen that IotS2024, lightw1nd, TeaAddictHacker, and RobH have all completed this lab. I wonder if they can help.