@@ 871,7 871,6 @@ gdb-peda$ x/4wx $ebp-0xc-0xc
- We already walked you on how to create a exploit before and pwntools so here is the resulting exploit, like before make sure you follow up and expand on this topic yourself.
- Completed exploit:
@@ 917,6 916,10 @@ uid=0(root) gid=1000(rek2) grupos=1000(rek2),10(wheel),91(video),92(audio),100(u
- this walktrough is based on the [ctf-wiki canary](https://ctf-wiki.github.io/ctf-wiki/pwn/linux/mitigation/canary/) I recommend you read it to understand what was said here and to complement span on to other material.
- Keep stdin open: