Category : Coding , Reverse engineering
* binary |
Summary : generate serial
[pwn3r@localhost ~]$ nc 192.168.0.13 8888 ZsIdTLcuTNYdJXa pwn3r Invalid router. Routing failed :( [pwn3r@localhost ~]$ nc 192.168.0.13 8888 ZxBSKUqrwwYqezO pwn3r Time out :( |
[pwn3r@localhost ~]$ nc 192.168.0.13 8888 KOkIhGSyESyOWfW aaaaaaaaaaaaaaa WAN ssl Your key is wrong :( |
exploit.py |
#!/usr/bin/python from socket import * HOST = "127.0.0.1" s = socket(AF_INET , SOCK_STREAM) print "[*] Connected !" s1 = s.recv(1024) for i in range(0 , len(org_key)): evil = "" for i in range(0 , len(s2)): print "[+] My serial : " + evil |
[pwn3r@localhost ~]$ ./exploit.py [+] My serial : abOQCrfiEraoEGn |
Flag : MerrySoloChristmas:)
'CTF' 카테고리의 다른 글
ISEC 2011 본선 CTF - board (0) | 2011.09.21 |
---|---|
ISEC 2010 본선 CTF - hks (0) | 2011.09.17 |
Defcon 19th CTF 2011 Quals - Potent Pwnables 100 (0) | 2011.09.11 |
Padocon 2011 Quals - Karma200 (0) | 2011.07.17 |
Padocon 2011 Quals - Karma100 (2) | 2011.07.17 |