P1flyingring [updated] Today

$ cat flag FLAGp1_flying_ring_overflow No NX + no canary + jmp esp gadget → classic stack overflow to shellcode.

Checking security:

$ ROPgadget --binary p1flyingring | grep "push esp" 0x0804858a : push esp ; ret Address: 0x0804858a . 32-bit execve shellcode (25 bytes): p1flyingring

Here’s a write-up for the challenge, assuming it’s a CTF/pwn challenge (common on platforms like pwnable.tw or similar). If you meant a different context (e.g., reversing, web), let me know. p1flyingring – Write-up Challenge Overview p1flyingring is a binary exploitation challenge. The name hints at a “flying ring” (possibly a pun on Feng Ring or buffer overflow). The binary is a 32-bit ELF with minimal protections. $ cat flag FLAGp1_flying_ring_overflow No NX + no