
#include #include #include #include void alarm_handler() { puts("TIME OUT"); exit(-1); } void initialize() { setvbuf(stdin, NULL, _IONBF, 0); setvbuf(stdout, NULL, _IONBF, 0); signal(SIGALRM, alarm_handler); alarm(30); } void get_shell() { system("/bin/sh"); } int main(int argc, char *argv[]) { long addr; long value; char buf[0x40] = {}; initialize(); read(0, buf, 0x80); //bof가능 printf("Addr : "..

To open new terminal in docker environment, we have to add this line to our python code.context.terminal = ['tmux', 'splitw', '-h'] If you didn't install tmux, you have to install it. It's one kind of Linux terminal. unfortunally I got this kind of error below.. You can solve it by changing your pwntools version (reference below) https://github.com/Gallopsled/pwntools/issues/1874

1. pip show pwntools 2. pwn version (얘는 도커 환경에서만 됐다)
https://cosyp.tistory.com/229 pwntools gdb.attach 사용법 - python process debugging gdb.attach 사용법 wargame이나 ctf 문제를 풀 때, 혹은 바이너리를 분석 할 때 파이썬으로 데이터를 입력하는 경우가 자주있다. example> p = process("binary") p.sendline("AAAA") 이 때 내가 입력한 데이터가 원하 cosyp.tistory.com https://snwo.tistory.com/133 [Linux] Pwntools gdb.attach() 하는법. python 익스코드를 작성한 뒤, gdb 를 attach 해 코드를 디버깅하고싶을때, gdb.attach() 를 사용합니다. from pwn import..