Return to site

One piece remastered

broken image

IVar1 = strcmp(local_20,'gomugomunomi\n') If we look at the source code, we can see that there is a 'hidden' option, *gomugomunomi*, that calls the function *mugiwara*, also similar to the one piece challenge. This time we are allowed to read 5 bytes into a buffer using the read function, and we can actually execute the 5 byte shellcode using the run command. However the functionallity of the two are different.

broken image

The menu is similar to the one piece challenge, we can read and run shellcode.

broken image

We can also overwrite GOT if needed, as its only partial RELRO. Note, i did not participate in the ctf, so i solved this challenge after the ctf had ended.Ĭhecksec reveals that its a 32 bit binary with executable stack.