write-ups-2015 | like CTF write-ups repository | Wiki library
kandi X-RAY | write-ups-2015 Summary
kandi X-RAY | write-ups-2015 Summary
Wiki-like CTF write-ups repository, maintained by the community. 2015
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of write-ups-2015
write-ups-2015 Key Features
write-ups-2015 Examples and Code Snippets
Community Discussions
Trending Discussions on write-ups-2015
QUESTION
I'm trying trying to do a pwn challenge, where you connect with nc to the remote server and this execute a vulnerable ELF file (With a buffer overflow). The problem that I'm having is that I only receive the output from the server side and the input from the client side with the following code: nc -l | ./script
Also I tried: ncat -l --exec "./script" In this last case when I do the Buffer Overflow, It doesn't give me any response.
And, other problem with both codes is that when my script for example prints "Give me a word", this print is showed when the execution of the script was finished. I put the word and then the script shows all the prints of the program.
Best regards.
PD: An example of what I'm trying to do - hxxps://github.com/ctfs/write-ups-2015/tree/master/csaw-ctf-2015/pwn/precision-100
...ANSWER
Answered 2017-Oct-25 at 20:26The |
and the missing port is most likely the problem. In ncat -l --exec "./script"
you are missing the listening port again.
Here is a full example that works:
The script:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install write-ups-2015
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page