The document describes exploiting a vulnerability in the Nebula Death Stick Services website. It finds that arbitrary files can be read via the ?page= parameter. It then uses this to read the binary and determine the environment. It constructs a ROP chain using gadgets in the binary to hijack control flow, modify the GOT to point execve to the libc execve function, and spawn a shell. It builds the ROP chain on a custom stack location by abusing sprintf calls to transfer bytes.