其他分享
首页 > 其他分享> > pwnable.kr第二题collision

pwnable.kr第二题collision

作者:互联网

 1 col@prowl:~$ ls -al
 2 total 36
 3 drwxr-x---   5 root    col     4096 Oct 23  2016 .
 4 drwxr-xr-x 114 root    root    4096 May 19 15:59 ..
 5 d---------   2 root    root    4096 Jun 12  2014 .bash_history
 6 -r-sr-x---   1 col_pwn col     7341 Jun 11  2014 col
 7 -rw-r--r--   1 root    root     555 Jun 12  2014 col.c
 8 -r--r-----   1 col_pwn col_pwn   52 Jun 11  2014 flag
 9 dr-xr-xr-x   2 root    root    4096 Aug 20  2014 .irssi
10 drwxr-xr-x   2 root    root    4096 Oct 23  2016 .pwntools-cache
11 col@prowl:~$ cat col.c
12 #include <stdio.h>
13 #include <string.h>
14 unsigned long hashcode = 0x21DD09EC;
15 unsigned long check_password(const char* p){
16         int* ip = (int*)p;
17         int i;
18         int res=0;
19         for(i=0; i<5; i++){
20                 res += ip[i];
21         }
22         return res;
23 }
24 
25 int main(int argc, char* argv[]){
26         if(argc<2){
27                 printf("usage : %s [passcode]\n", argv[0]);
28                 return 0;
29         }
30         if(strlen(argv[1]) != 20){
31                 printf("passcode length should be 20 bytes\n");
32                 return 0;
33         }
34 
35         if(hashcode == check_password( argv[1] )){
36                 system("/bin/cat flag");
37                 return 0;
38         }
39         else
40                 printf("wrong passcode.\n");
41         return 0;
42 }

参数构造20位,check_password函数内用int读char,即分成5个数

字符串以‘\x00'结尾,所以用'\x01'来填充,

0x21DD09EC-0x01010101*4=0x1DD905E8

col@prowl:~$ ./col $(python -c "print '\x01' * 16 + '\xE8\x05\xD9\x1D'")
daddy! I just managed to create a hash collision :)

 

标签:4096,collision,int,pwnable,kr,xr,2014,root,col
来源: https://www.cnblogs.com/DirWang/p/11233341.html