hod24-ctf/FullStackNote
2024-12-04 22:38:33 +01:00
..
Dockerfile chals: add FullStackNote 2024-12-03 14:24:04 +01:00
exploit.py Fullstacknote: writeup cleaning and readme 2024-12-04 22:38:33 +01:00
flag.txt chals: add FullStackNote 2024-12-03 14:24:04 +01:00
Makefile chals: add FullStackNote 2024-12-03 14:24:04 +01:00
readme.md Fullstacknote: writeup cleaning and readme 2024-12-04 22:38:33 +01:00
run.sh chals: add FullStackNote 2024-12-03 14:24:04 +01:00
script.ld chals: add FullStackNote 2024-12-03 14:24:04 +01:00
single.c chals: add FullStackNote 2024-12-03 14:24:04 +01:00
sss chals: add FullStackNote 2024-12-03 14:24:04 +01:00
sss.elf chals: add FullStackNote 2024-12-03 14:24:04 +01:00

Sfida CTF Hack or D(y|i)e 2024

Descrizione:

BIOS + OS + APP to take a note and.... segmented! Can you get the flag at 0x1400000 ???

Per lanciare la sfida in locale:

docker build -t biosnote . docker run -p 1337:1337 --privileged --rm --name biosnote biosnote

writeup/exploit in exploit.py

Tips

se usiamo gdb con qemu -S -s, gdb non traduce automaticamente gli indirizzi logici in indirizzi fisici usando la segmentazione. Per settare breakpoint calcolare l'indirizzo fisico dell'istruzione e usare break *indirizzo.