Skip to content

Files

Latest commit

ad04e72 · Mar 17, 2020

History

History

Jumpdrive

README.md

Jumpdrive

Summary

  • Format String Bug (x64)

Tools

  • pwndbg
  • IDA 7.0

Description

  • Vulnerability

    • 1
      • 2
    • In 64-bit, printf() applies the Formatter with the following order, $rsi, $rdx, $rcx, $r8, $r9, stack, ....
      • If you wanna access stack, enter the formatter like "%6$p" or "%7$p" or ....
  • Exploit

    • 3
      • The content of flag is saved in stack. So, simply could print by FSB.
    • Just print 4 times after offset 10.
      • "%10$p %11$p %12$p %13$p"
    • ex.py
  • pctf{pr1nTf_1z_4_St4R_m4p}