Currently working on a BoF challenge. I’ve downloaded the binary and wrote an exploit that uses shellcode. The return address (start of the buffer) is given when you run it, and the same each time. My exploit works fine on my local box, but when I do ‘cat payload | nc ip port’ it either segfaults or doesn’t give anything back. Anything I can look at?
If you need help with something, PM me how far you've got already, what you've tried etc (I won't respond to profile comments, or on box release night). And remember to +respect me if I helped you ; )