|
@@ -8,14 +8,14 @@ import string
|
|
|
# Set up pwntools for the correct architecture
|
|
|
exe = context.binary = ELF(args.EXE or './pwn')
|
|
|
# libc = ELF("/usr/lib/libc.so.6" if args.LOCAL else "./libc.so.6", checksec=False)
|
|
|
-libc = ELF("/usr/lib/libc.so.6" if args.LOCAL else "./libc_docker.so.6", checksec=False)
|
|
|
+libc = ELF("/usr/lib/libc.so.6" if args.LOCAL else "./libc.so.6", checksec=False)
|
|
|
|
|
|
# Many built-in settings can be controlled on the command-line and show up
|
|
|
# in "args". For example, to dump all data sent/received, and disable ASLR
|
|
|
# for all created processes...
|
|
|
# ./exploit.py DEBUG NOASLR
|
|
|
# ./exploit.py GDB HOST=example.com PORT=4141 EXE=/tmp/executable
|
|
|
-host = args.HOST or 'e529ac3d-26ff-4563-93ef-309578487141.rdocker.vuln.land'
|
|
|
+host = args.HOST or '1a889c42-b594-4c56-8b79-ac7e45ede7b4.rdocker.vuln.land'
|
|
|
port = int(args.PORT or 1337)
|
|
|
|
|
|
def start_local(argv=[], *a, **kw):
|