This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
#: CONNECT TO CHALLENGE SERVERS | |
binary = ELF('./baby_bof', checksec = False) | |
libc = ELF('./libc-2.31.so', checksec = False) | |
#p = process('./baby_bof') | |
#p = process('./baby_bof', env = {'LD_PRELOAD' : libc.path}) | |
p = remote("dctf-chall-baby-bof.westeurope.azurecontainer.io", 7481) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
#: CONNECT TO CHALLENGE SERVERS | |
binary = ELF('./uniqueLasso', checksec = False) | |
#libc = ELF('./libc.so.6', checksec = False) | |
#p = process('./uniqueLasso') | |
#p = process('./uniqueLasso', env = {'LD_PRELOAD' : libc.path}) | |
p = remote("lasso.sdc.tf", 1337) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
#: CONNECT TO CHALLENGE SERVERS | |
binary = ELF('./cachetroubles', checksec = False) | |
libc = ELF('./libc-2.31.so', checksec = False) | |
#p = process('./cachetroubles') | |
p = process('./cachetroubles', env = {'LD_PRELOAD' : libc.path}) | |
#p = remote("IP", PORT) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
#: CONNECT TO CHALLENGE SERVERS | |
binary = ELF('./deathnote', checksec = False) | |
libc = ELF('./libc.so', checksec = False) | |
#libc = ELF('./libc-2.23.so', checksec = False) | |
p = process('./deathnote', env = {'LD_PRELOAD' : libc.path}) | |
p.recvuntil(b'> ') |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
#: CONNECT TO CHALLENGE SERVERS | |
binary = ELF('./raiid_shadow_legends', checksec = False) | |
#libc = ELF('./libc.so.6', checksec = False) | |
#p = process('./raiid_shadow_legends') | |
#p = process('./raiid_shadow_legends', env = {'LD_PRELOAD' : libc.path}) | |
p = remote("shell.actf.co", 21300) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
#: CONNECT TO CHALLENGE SERVERS | |
binary = ELF('./birdie', checksec = False) | |
#libc = ELF('./libc.so.6', checksec = False) | |
#p = process('./birdie') | |
#p = process('./birdie', env = {'LD_PRELOAD' : libc.path}) | |
p = remote("34.121.211.139", 1111) | |
print(p.recvuntil(b'name\n')) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
''' | |
Created on Dec 14, 2011 | |
@author: pablocelayes | |
''' | |
import ContinuedFractions, Arithmetic, RSAvulnerableKeyGenerator | |
def hack_RSA(e,n): | |
''' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
#: CONNECT TO CHALLENGE SERVERS | |
binary = ELF('./pennywise', checksec = False) | |
libc = ELF('./libc.so.6', checksec = False) | |
#p = process('./pennywise', env = {'LD_PRELOAD' : libc.path}) | |
p = remote("139.162.160.184", 19999) | |
print(p.recvuntil(b'[Q]uit\n')) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
#: CONNECT TO CHALLENGE SERVERS | |
binary = ELF('./death_note', checksec = False) | |
libc = ELF('./libc.so.6', checksec = False) | |
p = process('./death_note', env = {'LD_PRELOAD' : libc.path}) | |
print(p.recvuntil('Exit\n')) | |
#: GDB SETTINGS |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
#: CONNECT TO CHALLENGE SERVERS | |
binary = ELF('./meddle', checksec = False) | |
libc = ELF('./libc-2.27.so', checksec = False) | |
#p = process('./meddle', env = {'LD_PRELOAD' : libc.path}) | |
p = remote("challenge.nahamcon.com", 32057) | |
print(p.recvuntil(b'> ')) |