App - System
PE32 - Stack buffer overflow basic problem
There’s a technical issue with the challenge, preventing completion.
Overflowing it was fine, but after that the series of automated command did not work because runas failed due to incorrect password.
Please fix as soon as possible so I can finish up the challenge.
rootmeerr.png (PNG, 40.8 kb)
PE32 - Stack buffer overflow basic problem
Hello,
There is no technical problem with this challenge, you are not supposed to run anything as Administrator, you are not even supposed to use the "runas" command.
There is a script called wrapper.sh that acts like a suid version of the binary, you must use this script to run your exploit instead of the ch72.exe binary itself.
Ech0
PE32 - Stack buffer overflow basic problem
Hmm ok, might be worth it to clarify that because I ran the binary directly by using printf "payload" | ./ch72.exe and it automatically ran the runas commands after I did that.
How do I correctly use wrapper.sh? I tried a few ways to run it but that wouldn’t work, could you elaborate how I’d correctly do so provided I already have a valid exploit string that I know would work fine?
PE32 - Stack buffer overflow basic problem
I have tried that already, whenever I do that the standard command prompt text appears but it returns immediately to the normal shell, so I couldn’t interact with it at all.
rootmeerr-2.png (PNG, 14.9 kb)
PE32 - Stack buffer overflow basic problem
Please read this : https://www.root-me.org/?page=forum&id_thread=10116