fail0verflow

when success just isn't an option
  • Blog
  • About

Recent Posts

  • PS4 Aux Hax 5: Flawed Instructions Get Optimized

  • PS4 Aux Hax 4: Belize via CEC

  • PS4 Aux Hax 3: Dualshock4

  • PS4 Aux Hax 2: Syscon

  • PS4 Aux Hax 1: Intro & Aeolia

  • ShofEL2, a Tegra X1 and Nintendo Switch exploit

  • Dumping a PS4 Kernel in "Only" 6 Days

  • The First PS4 Kernel Exploit: Adieu

  • Console Hacking 2016: Postscript

  • In Memoriam: Ben “bushing” Byer

  • Console Hacking 2015: Liner Notes

  • 31c3 CTF - pong (pwn30)

  • 31c3 CTF - safelock (signals20)

  • HubCap: pwning the ChromeCast pt. 2

  • HubCap: pwning the ChromeCast pt. 1

  • OpenVizsla OV3 - Hardware

  • RFID hacking preamble: a new peak detection for the proxmark3

  • RFID hacking preamble: designing an FPGA IIR filter for the proxmark3

  • Enhancing the AVIC-5000NEX - part 2

  • Enhancing the AVIC-5000NEX

  • plaidCTF 2014 - reeekeeeeee (web200)

  • plaidCTF 2014 - rsa (for450)

  • plaidCTF 2014 - wheeeee (crypto375)

  • plaidCTF 2014 - bbos (for350)

  • plaidCTF 2014 - graphs (crypto200)

In memory of Ben “bushing“ Byer

Pwnable

2014-12-31

31c3 CTF - pong (pwn30)

By marcan
Filed under 31c3CTF pwnable format string vulnerability

For the 31c3 CTF, Eindbazen and fail0verflow joined forces as 0xffa, the Final Fail Alliance.
Don't miss out on other write-ups at Eindbazen's site!
pong
pwn (30 pts)
-------------------
To play it, connect to our server via:

socat -,raw,echo=0 TCP:188.40.18.92:2001
Have fun!

read more

© fail0verflow, all rights reserved. Not a member of the Cheezburger© Group.