N2L
CtrlK
  • πŸ”°N2L
  • ⏱️Writeup CTFs
    • 2024
      • Page
      • FindIT 2024
      • CR3 CTF 2024
      • TBTL CTF 2024
      • NahamCon CTF 2024
      • Template CTF 2024
      • N2LHaRD_Write_Up_Cyber_Hunt24
  • πŸ“šcheatsheet
    • πŸͺŸWindows Privilege Escalation
    • 🐧Linux Privilege Escalation
    • 🌐web exploitation
      • πŸ’‰sql injection
      • πŸ—‚οΈserver side template injection
      • πŸŒ€Escaping nodejs vm
      • βš•οΈprototype pollution
      • βš”οΈCross-Site Scripting (XSS)
    • 🦠binary exploitation
      • ✨stack
        • 0x1 Buffer Overflow
        • 0x2 Modifying variabel through BOF
        • 0x3 return to another function through BOF
        • 0x4
      • 🟰heap
        • 1️introduction
      • benerin nis
    • πŸ”Žforensic
    • πŸ“ cryptography
    • 🎫misc
    • πŸ’Ήblockchain
  • πŸ“’HackTheBox Writeup
    • πŸ†“Freelancer
    • πŸ”΅Usage
    • 🀯Headless
    • β›½SolarLab
    • πŸ“©Mailing
Powered by GitBook
On this page
  1. πŸ“šcheatsheet
  2. 🦠binary exploitation
  3. ✨stack

0x3 return to another function through BOF

Biasanya juga dipanggil ret2win, jadi kita perlu memanggil suatu fungsi dengan BOF ini sendiri,.

nah chall ini ada di pwn103

Previous0x2 Modifying variabel through BOFNext0x4

Last updated 1 year ago