-
Notifications
You must be signed in to change notification settings - Fork 573
Open
Labels
🙋 questionQuestions or other issuesQuestions or other issues
Description
hole-in-bin
Hi team,
I'm having an issue with the ex06 binary. I've tried several approaches to exploit the vulnerability, but every time I perform a memory overflow, I get a segfault on .
Additionally, based on the analysis I conducted on the disassembled code, the program checks the number of arguments passed as parameters. However, the program crashes on the next if it is executed with fewer than 3 arguments. Specifically:
If no arguments are passed, it crashes on the first <strcpy>.
If one argument is passed, it crashes on the second <strcpy>, and so on.
Could you please verify whether this binary file is actually exploitable?
Metadata
Metadata
Assignees
Labels
🙋 questionQuestions or other issuesQuestions or other issues