👺
Codin'
Wannabe Code Artisan, also probably a DevOps
- NULL
- 0x2A (48.89662, 2.31844)
- selfsigned.dev
- @nope
Highlights
- Pro
PinnedLoading
- description of a ret2libc exploit in...
description of a ret2libc exploit in the 42 rainfall project 1##Ret2libc
2An alternative to using a shellcode is to find the adress of the`system()` function in memory and to complement it with a memory location that contains a shell path string.
3This method has the advantage of also working when the NX bit is set (not the case here), NX being a technology that marks certain areas of memory as non-executable, supposedly foiling buffer overflow attacks.
45####The exploit
- Functional FizzBuzz
Functional FizzBuzz 1// Logic
2typeFizzBuzzOutput=(x:number)=>string
3constFizz :FizzBuzzOutput=x=>(x%3===0) ?"Fizz" :""
4constBuzz :FizzBuzzOutput=x=>(x%5===0) ?"Buzz" :""
5constFizzBuzzPrint :FizzBuzzOutput=x=>Fizz(x)+Buzz(x)
Something went wrong, please refresh the page to try again.
If the problem persists, check theGitHub status page orcontact support.
If the problem persists, check theGitHub status page orcontact support.