crackmes.one

BitFriends's nx bypass

Author:
BitFriends

Language:
C/C++

Upload:
12:45 PM 06/06/2020

Platform
Unix/linux etc.

Difficulty:
3.0

Quality:
4.0

Arch:
x86-64

Description

Welcome to this crackme. Only executing shellcode on the stack, which executes /bin/sh is a valid solution. Do not make the stack executeable with a tool. Do not patch. I hope that you will learn how to bypass nx. Aslr has to be disabled with "echo 0 /proc/sys/kernel/randomize_va_space". If you are stuck, a little hint will be in the comments. Good luck!