Challenge info ret2win is the first challenge from rop emporium’s series of challenges of learning ROP. The objection of the challenge is to
Locate a method within the binary that you want to call and do so by overwriting a saved return address on the stack
Recon As always in order to solve any problem we must recon the problem and then understand it so that we can effectively write a solution.
In this article I went through the technique of sig-return oriented programming which can be used to exploit buffer overflow attacks when we don't have many ROP gadgets inside the binary, this technique exploits how Linux kernel handles the sig return syscall.