Hacking/LOB(Red Hat)

[LOB]level17 succubus

M0ca 2018. 1. 20. 06:22
반응형

ID:succubus

PW:here to stay


checking &strcpy(0x8048410)

strcpy have two parameter.(dest,src)


strcpy's ret is "AAAA"

So change ebp+48 address. using strcpy

dest is ebp+48. src is excuting shell address. put on buffer or argv[1] or anywere


payload

buffer(libc_system+system's ret+&/bin/sh+"\x90"*32+&strcpy+"AAAA"(fixed)+&(ebp+48 - AAAA)+&buffer

&ebp+48 change to buffer's address.

eip excute system("/bin/sh"). get /bin/sh using getenv.


exploit

반응형