We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 180b64e commit 67123beCopy full SHA for 67123be
CTFs/ImaginaryCTF/Speed.md
@@ -258,7 +258,7 @@ payload += p64(libc + 0x0449c0) # system()
258
## Launching the exploit
259
Finall version of the exploit is:
260
261
-[](https://asciinema.org/a/HGDVWN49PCOvR23c3LpSevxhK)
+[](https://asciinema.org/a/430559)
262
263
Exploit code:
264
```py
@@ -338,3 +338,8 @@ payload += p64(libc + 0x0449c0) # system()
338
server.sendline(payload)
339
server.interactive()
340
```
341
+
342
+## Credits:
343
+Writeup by Filip "Ret2Me" Poplewski
344
+Solved by Filip "Ret2Me" Poplewski
345
+WaletSec 2021
0 commit comments