Tags: seccomp pwn
Rating: 5.0
Pivot through all the different memory regions (program base, heap, stack, libc, ld) based on only one libc leak from the heap. Read the flag file by carefully building a mprotect ROP chain with the 8 byte write-what-where to make the heap executable and run shellcode that follows seccomp rules.