- Published on
Space pirate - Going Deeper
- Authors
- Name
- EternalCirco
- Github
- @Eternalcirno
Unzip pwn_sp_going_deeper.zip
to reveal a binary.
Putting the binary into Ghidra shows the password as DRAEGER15th30n34nd0nly4dm1n15tr4t0R0fth15sp4c3cr4ft
as seen in the image below:
But since the LF
char (0x0a)
is taken into the input, strncmp()
function call returns a non-zero result.
The exploit script is as follows; By terminating the string prematurely with a null byte, the LF
char is not included and the strncmp()
therefore returns 0
, giving us the flag.