OPERATION BREAKPOINT
BINARY EXPLOITATION // STACK OVERFLOW // RET2WIN
MISSION BRIEFING
Nexus Defense Systems has deployed a new authentication portal for their weapons control network. Intelligence reports suggest the portal binary has a critical vulnerability in its input handling.
Your mission: exploit the binary to bypass authentication and access the vault containing classified data.
The binary runs on the remote server. A gets() call allows unbounded input into a fixed-size buffer. Overwrite the return address to redirect execution to the hidden access_vault() function.
ARCHITECTURE
x86_64 ELF
NX
ENABLED
CANARY
DISABLED
PIE
DISABLED
RELRO
PARTIAL
REMOTE
port 4444
CONNECT TO TARGET
nc localhost 4444
SUBMIT FLAG