OPERATION BREAKPOINT

BINARY EXPLOITATION // STACK OVERFLOW // RET2WIN

MISSION BRIEFING

Nexus Defense Systems has deployed a new authentication portal for their weapons control network. Intelligence reports suggest the portal binary has a critical vulnerability in its input handling.

Your mission: exploit the binary to bypass authentication and access the vault containing classified data.

The binary runs on the remote server. A gets() call allows unbounded input into a fixed-size buffer. Overwrite the return address to redirect execution to the hidden access_vault() function.

ARCHITECTURE
x86_64 ELF
NX
ENABLED
CANARY
DISABLED
PIE
DISABLED
RELRO
PARTIAL
REMOTE
port 4444
CONNECT TO TARGET
nc localhost 4444
SUBMIT FLAG