flagshop
Binary Exploitation
Last updated
Binary Exploitation
Last updated
Given a binary, it contained a simple flag shop program:
I decided to open Ghidra to analyze it further.
Looking at the decompiled binary, the vulnerability in this challenge is a simple integer overflow to make the total cost negative so I could add to the balance to buy the flag.
Using a simple calculation to divide a number above the 32-bit signed integer limit with the cost of the discounted flag, I was able to do an integer overflow to buy the flag!