~rek2/101_Simple-Exploitation_Because_I_can

77b1de06df4c0531b29235e8e1df41b6433ed3e3 — ReK2 2 years ago d3a19c8
add link to ctf-wiki into to canary for people to follow up
1 files changed, 4 insertions(+), 1 deletions(-)

M README.md
M README.md => README.md +4 -1
@@ 871,7 871,6 @@ gdb-peda$ x/4wx $ebp-0xc-0xc

  - We already walked you on how to create a exploit before and pwntools so here is the resulting exploit, like before make sure you follow up and expand on this topic yourself.


- Completed exploit:
```
#!/usr/bin/python


@@ 917,6 916,10 @@ uid=0(root) gid=1000(rek2) grupos=1000(rek2),10(wheel),91(video),92(audio),100(u
$
```

- this walktrough is based on the [ctf-wiki canary](https://ctf-wiki.github.io/ctf-wiki/pwn/linux/mitigation/canary/) I recommend you read it to understand what was said here and to complement span on to other material.



---
## Tricks
- Keep stdin open: