From 7797bf63ee081531bd00a7b2e6c1569863c5e73b Mon Sep 17 00:00:00 2001 From: thomashaw Date: Mon, 22 Mar 2021 20:41:23 +0000 Subject: [PATCH] MetaCTF: fix --- .../metactf/files/repository/src_sse/SSE/Ch_nx_BOF_1/build.zsh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/utilities/unix/ctf/metactf/files/repository/src_sse/SSE/Ch_nx_BOF_1/build.zsh b/modules/utilities/unix/ctf/metactf/files/repository/src_sse/SSE/Ch_nx_BOF_1/build.zsh index 69e883f91..1fcbb5309 100644 --- a/modules/utilities/unix/ctf/metactf/files/repository/src_sse/SSE/Ch_nx_BOF_1/build.zsh +++ b/modules/utilities/unix/ctf/metactf/files/repository/src_sse/SSE/Ch_nx_BOF_1/build.zsh @@ -7,7 +7,7 @@ if [[ ARGC -gt 0 ]] then # No randomisation, this is a static example to demonstrate a stack-based exploit failing due to nx stack cat program.c.template > program.c - gcc -g -m32 -fno-stack-protector -z norelro -fno-pie -no-pie -Wl,--section-start=.text=0x64574b7a: -mpreferred-stack-boundary=2 -o obj/$USER/$BINNAME program.c + gcc -g -m32 -fno-stack-protector -z norelro -fno-pie -no-pie -Wl,--section-start=.text=0x64574b7a -mpreferred-stack-boundary=2 -o obj/$USER/$BINNAME program.c end else echo "USAGE: build.zsh "