ret2libc
The standard ROP exploit
Disabling ASLR
echo 0 | sudo tee /proc/sys/kernel/randomize_va_spaceManual Exploitation
Getting Libc and its base
$ ldd vuln-32
linux-gate.so.1 (0xf7fd2000)
libc.so.6 => /lib32/libc.so.6 (0xf7dc2000)
/lib/ld-linux.so.2 (0xf7fd3000)Getting the location of system()
Getting the location of /bin/sh
32-bit Exploit
64-bit Exploit
Automating with Pwntools
Last updated
Was this helpful?