Contents

๐Ÿ’ฃ PIE TIME

A detailed write-up of the Pwn challenge 'PIE TIME' from PicoCTF - 2025

/images/PicoCTF-2025/Pwn/PIETime/challenge_presentation.png
Challenge Presentation

๐Ÿ“Š Challenge Overview

Category Details Additional Info
๐Ÿ† Event PicoCTF - 2025 Event Link
๐Ÿ”ฐ Category Pwn ๐Ÿ’ฃ
๐Ÿ’Ž Points 75 Out of 500 total
โญ Difficulty ๐ŸŸข Easy Personal Rating: 1/10
๐Ÿ‘ค Author Darkraicg492 Profile
๐ŸŽฎ Solves (At the time of flag submission) 1.914 solve rate
๐Ÿ“… Date 15-03-2025 PicoCTF - 2025
๐Ÿฆพ Solved By mH4ck3r0n3 Team:

๐Ÿ“ Challenge Information

Can you try to get the flag? Beware we have PIE!

๐ŸŽฏ Challenge Files & Infrastructure

Provided Files

Files:

๐Ÿ” Initial Analysis

First Steps

As a first step, as a good practice, I always analyze the security flags of the binary:

/images/PicoCTF-2025/Pwn/PIETime/checksec.png
CheckSec

And as we can see, it indeed has PIE (Position Independent Executable) enabled. This means that memory addresses are randomized on each execution and differ from the local ones. We are also given the source code directly, so we donโ€™t need to analyze it with ghidra. As we can see, it leaks the address of the main function:

1
printf("Address of main: %p\n", &main);

This program takes an address as input and performs a jmp (jump) to that address. Reading the source, there is a function called win that reads the flag.txt file where the flag is stored. However, this function is obviously not called, we need to use the jmp to jump to the function via its address, and since we know that the distance (offset) between two functions is fixed, we can calculate it locally and then, once we get the address of main remotely, subtract the offset and consequently jump to the win function containing the flag.

๐ŸŽฏ Solution Path

Exploitation Steps

Initial setup

As a first step, I calculate the local offset by doing main address - win address. I did it directly from pwngdb with the command p/x &main - &win:

/images/PicoCTF-2025/Pwn/PIETime/offset.png
Offset

As we can see, the offset is 0x96, let’s proceed with the exploitation.

Exploitation

I then connected with nc and obtained the address of the main 0x56a08049a33d. Then I opened pwndbg again and ran p/x 0x56a08049a33d - 0x96 to calculate the address of the win function, obtaining: 0x56a08049a2a7. Once entered as input when asked for the address we want to jump to, I obtained the flag.

Flag capture

/images/PicoCTF-2025/Pwn/PIETime/manual_flag.png
Manual Flag

๐Ÿ› ๏ธ Exploitation Process

Approach

The exploit uses pwntools and regex to extract the address of the main, calculate the offset, and send the address of the win function as done previously. Then it extracts the flag from the response using a regex and prints it.

๐Ÿšฉ Flag Capture

Flag

picoCTF{b4s1c_p051t10n_1nd3p3nd3nc3_00dea386}

Proof of Execution

/images/PicoCTF-2025/Pwn/PIETime/automated_flag.png
Automated Flag
Screenshot of successful exploitation

๐Ÿ”ง Tools Used

Tool Purpose
pwnGDB Debugging
Python Exploit

๐Ÿ’ก Key Learnings

Time Optimization

  • Use p/x &foo - &boo directly inside pwngdb to calculate the offset in hex.

Skills Improved

  • Binary Exploitation
  • Reverse Engineering
  • Web Exploitation
  • Cryptography
  • Forensics
  • OSINT
  • Miscellaneous

๐Ÿ“š References & Resources

Learning Resources


๐Ÿ“Š Final Statistics

Metric Value Notes
Time to Solve 00:05 From start to flag
Global Ranking (At the time of flag submission) 1176/10517 Challenge ranking
Points Earned 75 Team contribution

Created: 15-03-2025 โ€ข Last Modified: 15-03-2025 *Author: mH4ck3r0n3 โ€ข Team: *