There is a classical stack buffer overflow in the stripped aarch64 binary, it's is designed for hackers those are new to binary exploitation.
It's technically the easiest challenge, but not all solvers have understood the meaning behind it.
-
The stack pionter ($sp) in this program is growing up, unlike any other program. It's invisible if you solve the challenge by decompiler, fuzzer or tools like pwntools.cyclic.
-
MRA means for reversed ARM, it grants 🦾 which is a mechanical arm
-
I add tag
reversing
because of the reversed stack layout. Reversing the stripped aarch64 binary is trivial and it should not be qualified as a real reversing challenge. -
It's inspired by the brilliant project isEvenApi
-
As the flag says, the Order Of Overflow is odd!