Skip to content

Https- Bit.ly Crackfire May 2026

| Address | Symbol | Purpose | |---------|--------|---------| | 0x401260 | main | reads user input with scanf("%s", buf) | | 0x4010f0 | check | compares input to a hidden string ( secret ) | | 0x401240 | win | prints flag and exits |

# Target location: saved RIP on stack (found via %p leaks) ret_addr = 0x7fffffffe0a8 # example address from a local run https- bit.ly crackfire

We’ll use the syntax to reference the n‑th argument directly. 7. Crafting the write payload We want to write the address of win (e.g., 0x5555555552f0 ) into the saved RIP located at stack position 3 (the third argument after the format string). The binary is compiled PIE, so we need

The binary is compiled PIE, so we need to of _start (found via readelf -s crackfire | grep _start → 0x4006f0 ) to get the load address: The binary is compiled PIE

$ ./crackfire Welcome to CrackFire! Enter the secret code: > If you type anything other than the hidden code you get:

Conversion Calculator

= 0 mm
= 0
= 0 m/s
= 0 °F