diff --git a/modules/utilities/unix/ctf/metactf/files/repository/src_sse/SSE/Ch_nx_BOF_1/build.zsh b/modules/utilities/unix/ctf/metactf/files/repository/src_sse/SSE/Ch_nx_BOF_1/build.zsh index 69e883f91..1fcbb5309 100644 --- a/modules/utilities/unix/ctf/metactf/files/repository/src_sse/SSE/Ch_nx_BOF_1/build.zsh +++ b/modules/utilities/unix/ctf/metactf/files/repository/src_sse/SSE/Ch_nx_BOF_1/build.zsh @@ -7,7 +7,7 @@ if [[ ARGC -gt 0 ]] then # No randomisation, this is a static example to demonstrate a stack-based exploit failing due to nx stack cat program.c.template > program.c - gcc -g -m32 -fno-stack-protector -z norelro -fno-pie -no-pie -Wl,--section-start=.text=0x64574b7a: -mpreferred-stack-boundary=2 -o obj/$USER/$BINNAME program.c + gcc -g -m32 -fno-stack-protector -z norelro -fno-pie -no-pie -Wl,--section-start=.text=0x64574b7a -mpreferred-stack-boundary=2 -o obj/$USER/$BINNAME program.c end else echo "USAGE: build.zsh "