Theme Layout

Boxed or Wide or Framed

Wide

Theme Translation

Display Featured Slider

Featured Slider Styles

Display Grid Slider

yes

Grid Slider Styles

Display Trending Posts

Display Author Bio

Display Instagram Footer

off

Dark or Light Style

Light
Powered by Blogger.

Tuesday, January 31, 2017

[Hacker School] FTZ Level11 ( Ver. Eng )







Level11


Use the password “ what!@#$? ” to access level11 account and check the hint.


I think of it as the source code of attackme. Because the  content of hint is only source code. This attack exists FSB and BOF vulnerability. I solve this problem using the BOF vulnerability. To try RTL ( Return To Libc ), I first check the ASLR of libc


When I check the ASLR using ldd command, This program does not apply ASLR.Next, I use gdb to figure out the stack.



After that, I find the address of the System function and the address where “/bin/sh” is located. and then, I create a separate file and find the address of the system function. Because I still do not have level12 permission.



Then, create the following code to find the address where “/bin/sh” is located:


So, I acquire all the materials to try RTL. The attack method is as follows.



The completed payload is as follows.. `perl -e ‘print “A”x268,”\xc0\xf2\x03\x42”,”AAAA”,”\xa4\x73\x12\x42”’When I type the payload, level12 shell is executed, and I get the password of level12.


QuickEdit
Unknown
0 Comments
Share This Post :

You Might Also Like

No comments:

Post a Comment

Follow @SunriseSunsetBlog