This is an exploit for HoleyBeep.
To use it, place any command you want root to execute in /tmp/x
.
$ cat /tmp/x
echo PWNED $(whoami)
/* | |
* wintypes.h | |
* | |
* Windows Data Types | |
* Copyright 2020 (c) Samantaz Fox | |
* | |
* This file is in the public domain. | |
* Feel free to copy, modify, redistribute it! | |
* |
#!/usr/bin/env python3 | |
import pexpect | |
with open('Passwords.txt') as passwords: | |
for password in passwords: | |
p = pexpect.spawn('/bin/bash -c "keepassxc-cli open test.kdbx"') | |
p.expect("Enter password to unlock") | |
p.sendline(password) | |
p.timeout = 2 |
radare2 is a very cool set of tools that you probably don't know how to use! Let's go through a simple exploit CTF challenge to understand how to use it for exploit development.
We'll be focusing on "ropasaurus rex" which is a simple challenge from Plaid CTF After checking out the latest and greatest radare from git, let's get started!
Open up ropasaurusrex in r2 and call analyze on the binary. We can list the functions with "afl"