Username: 
Password: 
Restrict session to IP 

Help  Go to the Choose your Path II challenge

Global Rank: 96
Totalscore: 173669
Posts: 100
Thanks: 108
UpVotes: 70
Registered: 14y 189d




Last Seen: 3y 97d
The User is Offline
Help
Google/translate0Thank You!0Good Post!0Bad Post! link
Can someone point me in the right direction for this? I am trying to exploit the replacement function somehow. Is it possible or does the solution require a different approach?
Global Rank: 96
Totalscore: 173669
Posts: 100
Thanks: 108
UpVotes: 70
Registered: 14y 189d




Last Seen: 3y 97d
The User is Offline
RE: Help
Google/translate1Thank You!1Good Post!0Bad Post! link
Ok I just solved it. It was a delight. Smile
Global Rank: 319
Totalscore: 72307
Posts: 25
Thanks: 22
UpVotes: 17
Registered: 10y 176d



Last Seen: 2y 62d
The User is Offline
RE: Help
Google/translate0Thank You!1Good Post!0Bad Post! link
I'm lost on this one. Dose it involve reverse engineering using gdb (memory modification)? I ask because all I can think of as an injection in arg1 can't break the surrounding single quotes to form something like:
GeSHi`ed bash code
1
wc 'blah'  | cat solution.txt > 'somewhere' 


Any hint would be welcome. Thank you!
Global Rank: 97
Totalscore: 173100
Posts: 14
Thanks: 10
UpVotes: 9
Registered: 8y 188d




The User is Offline
RE: Help
Google/translate0Thank You!1Good Post!0Bad Post! link
Any hint?
Global Rank: 97
Totalscore: 173100
Posts: 14
Thanks: 10
UpVotes: 9
Registered: 8y 188d




The User is Offline
RE: Help
Google/translate1Thank You!0Good Post!0Bad Post! link
A hint please! I am spending my whole life on this!!!
Global Rank: 97
Totalscore: 173100
Posts: 14
Thanks: 10
UpVotes: 9
Registered: 8y 188d




The User is Offline
RE: Help
Google/translate1Thank You!1Good Post!0Bad Post! link
Hahaha, finally solved! So easy, but I was narrow-minded.
Redknee, tunelko, silenttrack, n0tHappy, quangntenemy, TheHiveMind, Z, balicocat, Ge0, samuraiblanco, arraez, jcquinterov, hophuocthinh, alfamen2, burhanudinn123, Ben_Dover, stephanduran89, braddie0, SwolloW, dangarbri have subscribed to this thread and receive emails on new posts.
1 people are watching the thread at the moment.
This thread has been viewed 8223 times.