Task: Indirect Business

The indirect-business/support/buff-ovf binary contains a classic vulnerability. Use the input to alter the data in your favor.

If you experience a neural buffer overflow, take a look at the relevant lab and at online examples.

If that still doesn’t work, keep in mind that the great cybersecurity expert named Sun Tzu was a big proponent of bruteforce attacks.


Table of contents