App - System

Monday 30 December 2019, 20:59  #1
PE32 - Stack buffer overflow basic
MoniV
  • 2 posts

Hey guys, I hope you’re doing well ..

This challenge is fairly easy, overwrite the return address and use the opened shell, but the problem that I am facing is that when using the opened shell it says "Access is denied."

What would be the problem? Any hints?

Monday 30 December 2019, 21:04  #2
PE32 - Stack buffer overflow basic
MoniV
  • 2 posts

Never mind, I used the wrapper and it worked!

Thursday 16 January 2020, 23:29  #3
PE32 - Stack buffer overflow basic
Anonymous

I managed to pop a shell, however the .passwd is under Administrators, and me is app-systeme-ch72 user. There is no SUID for the ch72.exe What the heck? Is it kinda ROP chain with suid + system?

Friday 17 January 2020, 13:11  #4
PE32 - Stack buffer overflow basic
Th1b4ud
  • 1636 posts

Nope. Check the script wrapper.sh

Monday 10 February 2020, 17:34  #5
PE32 - Stack buffer overflow basic
Jaidan
  • 1 posts

Hi there! silly question in all likelihood, but — can’t get the wrapper to run. It’s odd, it’s just an ssh to localhost with an existing key. I try running wrapper then the sploit, and then try running the sploit then calling the wrapper. Try calling up a pseudo-terminal and then calling the wrapper... Nothing. When I remove the `-q` from the ssh command I see the MOTD but it seems to freeze. Hitting enter just quits.

At the risk of hanging my head in shame... Any tips / tricks to recommend? I can get the shell no problem like above. Just can’t get the rights... :)

Tuesday 9 June 2020, 13:41  #6
PE32 - Stack buffer overflow basic
hazelash
  • 1 posts

What is the correct way to use this wrapper?
I got the shell but just the auth is failing and I understood what this wrapper can do.
Just don’t know what the cmdline should look like using the wrapper. Any reference that I can get the idea?

Monday 21 September 2020, 19:38  #7
PE32 - Stack buffer overflow basic
molegral
  • 1 posts

The Idea is to pipe the Exploit to the wrapper e.g. cat <(python -c "print(.............) - | ./wrapper.sh

Friday 11 March 2022, 09:03  #8
PE32 - Stack buffer overflow basic
Ritesh yadav
  • 1 posts

Htmlhack