Skip to content

Instantly share code, notes, and snippets.

@parksjin01
Created April 8, 2017 06:12
Show Gist options
  • Save parksjin01/da4a7e5ccef712b884e5269b2c1e8826 to your computer and use it in GitHub Desktop.
Save parksjin01/da4a7e5ccef712b884e5269b2c1e8826 to your computer and use it in GitHub Desktop.
CSAW 2016 writeup

warmup

  • First this program is stripped so we have to find ep with readelf funtion. EP of main function is 0x40061d
  • Payload: [buffer]*64 + rbp + ret
  • To bypass ASLR we have to know start address of easy function and it's provided
  • Actual payload looks like this 'a'*72+'\x0d\x06\x40\x00'+'\x00'*4
  • It's python code is at here

tutorial

Other problem is too difficult ;;;

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment