Fix — Asc 11
Here’s a (likely referring to the 11th Allied Security CTF challenge, or a similar “ASC” CTF / wargame).
objdump -d asc11 | grep -E "win|system|shell" If none, we need ret2libc. asc 11
void main(void) char buf[32]; setvbuf(stdout, NULL, 2, 0); puts("Input: "); gets(buf); // <-- vulnerable Here’s a (likely referring to the 11th Allied
./asc11 It prints "Input: " , waits for input, then exits. Open in Ghidra/IDA. The main function: waits for input
gets → classic buffer overflow. No canary, PIE off → easy ret2win/ret2libc. Use gdb + pattern create (from pwntools or msf-pattern ):
Leave a Reply