Osimili Returns
HardPurple TeamPwn 3-4 hrs
Challenge Description / Scenario
This server-side binary runs with elevated privileges. Exploit the memory corruption vulnerability to gain a shell. Stack canaries are enabled, but as always, there's a way through.
Submit Flags
3 questions — answer all to complete the challenge
500 pts
1
What is the offset to the return address?
2
Which ROP gadget address do you use to control RDI?
3
Submit the root flag from /root/flag.txt