Solving format1 from exploit-exercises.com with a simple Format String vulnerability, exploited with %n.
stack layout: https://www.win.tue.nl/~aeb/linux/hh/...
format1: https://exploit.education/protostar/f...
CTF format string exploit: https://gist.github.com/LiveOverflow/...
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Website: https://liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
=[ 📄 P.S. ]=
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#BinaryExploitation #FormatString