- leak canary, stack address and libc.address using format string bug in router();
- with known canary and libc.address, we're able to ROP.
- I just want to send my payload using requests.get(), so I make a mprotect(stack, 0x1000, 7) and using rop then jump to my shellcode.
exploit here
Follow me if you like this writeup :)