ChallengesPwnOsimili Returns

Osimili Returns

HardPurple TeamPwn 3-4 hrs

Challenge Description / Scenario

This server-side binary runs with elevated privileges. Exploit the memory corruption vulnerability to gain a shell. Stack canaries are enabled, but as always, there's a way through.

Submit Flags

3 questions — answer all to complete the challenge

500 pts
1

What is the offset to the return address?

2

Which ROP gadget address do you use to control RDI?

3

Submit the root flag from /root/flag.txt