gotem64
Repeating a GOT overwrite in 64-bit.
Last updated
Repeating a GOT overwrite in 64-bit.
Last updated
This is the same binary as gotem, except we're in 64-bit this time. This makes almost no change in the exploit other than changing the base address of libc
and the offset of the format string.
Below is a functional exploit. Try to rebuild it independently to understand how to collect the format string offset and the libc
base address.
Running this exploit gets us a shell, which gives us our flag!