Rigel (Launched 2003)
Click to reveal password:
- Points: 15
The revelations from Antares is clear. Gobians considered the orbiter a serious threat, and you must too. Luckily, you now know where the final answer to this question, the blueprint, lies... Rigel is a true display of Gobian technological ingenuity. Launched right before the fall of the Union, it is armed with all of the most powerful hardening techniques at the time. Luckily, CSA allies have managed to disable all but the most powerful defense: ASLR. Your final job is to defeat ASLR, hack into Rigel and get the blueprints to fully understand Caltopia's true intentions.
This part of the project enables ASLR.
Note that even though ASLR is enabled, position-independent executables are not enabled. Therefore, the code section of memory is always at the same spot.
Also consider that enabling ASLR means you may end up with a nondeterministic solution.
./exploit accounts for this by running multiple times (which could take some time). If you see some
Segmentation Faults when running your script, that’s expected!
It might help to read Section 8 of “ASLR Smack & Laugh Reference” by Tilo Müller.
You may find it useful to know how to examine the addresses of individual assembly instructions. This can be done by running
disas <function_name>in gdb, where
<function_name>is the name of a function like
It might also help to note that a no-op instruction in assembly can be represented by the single-byte instruction
- A script
- A writeup