- ๐ Hi, Iโm @selfsigned
- ๐ Done with 42 Paris' Level 7 RNCP certification, just need more work experience to validate it!
- ๐ Doing Advent of Svelte
- ๐ผ Currently looking for a Front/FullStack position, get in touch!
๐บ
Codin'
Wannabe Code Artisan, also probably a DevOps
-
NULL
- 0x2A (48.89662, 2.31844)
- selfsigned.dev
- @nope
Highlights
- Pro
Pinned Loading
-
-
description of a ret2libc exploit in...
description of a ret2libc exploit in the 42 rainfall project 1## Ret2libc
2An alternative to using a shellcode is to find the adress of the `system()` function in memory and to complement it with a memory location that contains a shell path string.
3This method has the advantage of also working when the NX bit is set (not the case here), NX being a technology that marks certain areas of memory as non-executable, supposedly foiling buffer overflow attacks.
45#### The exploit
-
Functional FizzBuzz
Functional FizzBuzz 1// Logic
2type FizzBuzzOutput = (x: number) => string
3const Fizz : FizzBuzzOutput = x => (x % 3 === 0) ? "Fizz" : ""
4const Buzz : FizzBuzzOutput = x => (x % 5 === 0) ? "Buzz" : ""
5const FizzBuzzPrint : FizzBuzzOutput = x => Fizz(x) + Buzz(x)
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.