HSCTF_2017: Python Exploitation 1

Category: Exploitation Points: 100 Description:

Seeing a non-web exploitation problem Keith prepared their binary and c knowledge, but to their surprise, it was a .py! Help Keith learn to exploit python programs. Netcat to 104.131.90.29:8005. Note- The flag can be mistaken for an error message.

Write-up

This one was meant to be simple, involving the use of Python 2s completely insecure input() function which uses an eval(raw_input()) wrapper. We can easily hijack this by supplementing the input with the password variable like thisisthepassword or we can take it a step further.

For this one though, I'll just be spawning a shell.

Therefore, the flag is eh nah.

results matching ""

    No results matching ""