Skip to content

Commit 303361d

Browse files
committed
fix: table header name
1 parent 831950f commit 303361d

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

_posts/2025-10-22-picoctf-picker-iv-writeup.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,16 @@ tags:
1313

1414
# Table of Contents
1515

16-
1. [Description and Hints](#orgd259909)
17-
2. [Assets](#org9fbf909)
18-
1. [`picker-IV.c`](#org30a98ad)
19-
2. [`picker-IV`](#org57a6bc5)
20-
3. [Input `win`'s address to get the flag](#org927a1f8)
21-
4. [Takeaways](#org8ae92de)
22-
5. [Risks and Mitigations](#orgb6acb4d)
16+
1. [Description and Hints](#org4d3af5f)
17+
2. [Assets](#org9c94ccc)
18+
1. [`picker-IV.c`](#org7a632bb)
19+
2. [`picker-IV`](#org1469e7b)
20+
3. [Input `win`'s address to get the flag](#org0f9a3da)
21+
4. [Takeaways](#org5d85c8d)
22+
5. [Risks and Mitigations](#org8c20a25)
2323

2424

25-
<a id="orgd259909"></a>
25+
<a id="org4d3af5f"></a>
2626

2727
# Description and Hints
2828

@@ -36,7 +36,7 @@ and given the following hints:
3636
> 2. How can you find the address that `win` is at?
3737
3838

39-
<a id="org9fbf909"></a>
39+
<a id="org9c94ccc"></a>
4040

4141
# Assets
4242

@@ -46,7 +46,7 @@ We are given the following assets:
4646
2. Its source code `picker-IV.c`.
4747

4848

49-
<a id="org30a98ad"></a>
49+
<a id="org7a632bb"></a>
5050

5151
## `picker-IV.c`
5252

@@ -127,7 +127,7 @@ ELF files are *programs*: a chunk of bytes that we can run on the computer, and
127127
In the next section we analyze the chunk we got here.
128128

129129

130-
<a id="org57a6bc5"></a>
130+
<a id="org1469e7b"></a>
131131

132132
## `picker-IV`
133133

@@ -162,7 +162,7 @@ readelf --symbols picker-IV | grep win
162162
The address of `win` is `40129e`.
163163

164164
**Note:** If we run the command without the `grep` part, we can see the headers of the symbol table.
165-
*Value* is the value of the memory address, and *Name* the name of the symbol; in our case the `FUNCTION` `win`.
165+
*Value* is the value of the memory address, and *Name* the name of the symbol; in our case the `FUNC~tion ~win`.
166166
Below we can see a stripped output with just the header and `win`'s line.
167167

168168
{% highlight shell %}
@@ -173,7 +173,7 @@ readelf --symbols picker-IV
173173
63: 000000000040129e 150 FUNC GLOBAL DEFAULT 15 win
174174

175175

176-
<a id="org927a1f8"></a>
176+
<a id="org0f9a3da"></a>
177177

178178
# Input `win`'s address to get the flag
179179

@@ -236,7 +236,7 @@ There's the same address, but with the prefix `0x`.
236236
This also makes it much easier *reverse engineering* that binary.
237237

238238

239-
<a id="org8ae92de"></a>
239+
<a id="org5d85c8d"></a>
240240

241241
# Takeaways
242242

@@ -247,7 +247,7 @@ This also makes it much easier *reverse engineering* that binary.
247247
We may use `readelf` or `gdb` for that.
248248

249249

250-
<a id="orgb6acb4d"></a>
250+
<a id="org8c20a25"></a>
251251

252252
# Risks and Mitigations
253253

0 commit comments

Comments
 (0)