Updated libc.so.6
This commit is contained in:
parent
3d8459f0fd
commit
3e6fbbfa87
2
Day 22/Dockerfile
Normal file → Executable file
2
Day 22/Dockerfile
Normal file → Executable file
@ -1,6 +1,6 @@
|
||||
FROM ubuntu:22.04
|
||||
|
||||
RUN apt-get update -y && apt-get install -y socat gdb strace
|
||||
RUN apt-get update -y && apt-get install -y socat
|
||||
|
||||
RUN useradd -d /home/santa/ -m -p santa -s /bin/bash santa
|
||||
RUN echo "santa:santa" | chpasswd
|
||||
|
@ -8,14 +8,14 @@ import string
|
||||
# Set up pwntools for the correct architecture
|
||||
exe = context.binary = ELF(args.EXE or './pwn')
|
||||
# libc = ELF("/usr/lib/libc.so.6" if args.LOCAL else "./libc.so.6", checksec=False)
|
||||
libc = ELF("/usr/lib/libc.so.6" if args.LOCAL else "./libc_docker.so.6", checksec=False)
|
||||
libc = ELF("/usr/lib/libc.so.6" if args.LOCAL else "./libc.so.6", checksec=False)
|
||||
|
||||
# Many built-in settings can be controlled on the command-line and show up
|
||||
# in "args". For example, to dump all data sent/received, and disable ASLR
|
||||
# for all created processes...
|
||||
# ./exploit.py DEBUG NOASLR
|
||||
# ./exploit.py GDB HOST=example.com PORT=4141 EXE=/tmp/executable
|
||||
host = args.HOST or 'e529ac3d-26ff-4563-93ef-309578487141.rdocker.vuln.land'
|
||||
host = args.HOST or '1a889c42-b594-4c56-8b79-ac7e45ede7b4.rdocker.vuln.land'
|
||||
port = int(args.PORT or 1337)
|
||||
|
||||
def start_local(argv=[], *a, **kw):
|
||||
|
BIN
Day 22/libc.so.6
BIN
Day 22/libc.so.6
Binary file not shown.
Binary file not shown.
Binary file not shown.
0
Day 22/secret.txt
Normal file → Executable file
0
Day 22/secret.txt
Normal file → Executable file
Loading…
Reference in New Issue
Block a user