Binary Exploitation - Format String + Buffer Overflow Vulnerability
·3623 words·18 mins
A detailed guide to use a format string vulnerability to bypass protections and use the buffer overflow vulnerability to get a shell.
Foreword #I want to write this post because while I was trying to learn more about binary exploitation, I came across this interesting challenge as this shows how a two way vulnerability would be used to bypass stack canary protection and executable stack and let you use the buffer overflow vulnerability.