Texas Instruments Security Week 2025
⚓️ Ahoy, landlubbers and logic-lords! This be sh3lldon3 of the notorious crew H4ck_th3_Wh47, chartin’ a course straight into the stormy seas of Texas Instruments Security Week 2025! 🏴☠️ Each system’s a cryptic siren song, each puzzle a treasure chest locked with layers of encryption. We don’t just hack—we unravel, we decode, we conquer. 🔐⚡
PWN
ez printf
First I look for file type and protections.
Analysing and decompiling the binary:
So, we can see that there is a clear format string vulnerability twice, since no format specifiers are passed to printf
.
Further there is also a win
function that prints the flag.
Exploit
Use the first input to leak an address that points into the binary itself, which we'll use further to get runtime
win
function address (thereby Bypassing PIE protection).Overwriting the GOT entry for
puts
with the dynamically resolved addr of thewin
function (GOT overwrite).
Execution
Last updated