AHC - PascalCTF 2026
Challenge Info Property Value CTF PascalCTF 2026 Challenge Heap Category Pwn Points 450+ Solves idk Description idk honestly Files provided: average libc.so.6 ld-linux-x86-64.so.2 Connection info: 1 nc ahc.ctf.pascalctf.it 9003 Vulnerability Discovery Before diving into the exploitation steps, let’s analyze the vulnerable function responsible for the bug. The core issue is in the way the program handles user input for the message field. The function responsible for reading the message does not properly check the length of the input, and uses a scanf("%s", ...), which stops reading at the first null byte but does not prevent the user from overflowing the intended buffer size. This means that if the user provides more data than the buffer can hold, the excess bytes will overwrite adjacent memory regions. ...