{"id":955,"date":"2016-08-23T21:48:31","date_gmt":"2016-08-23T13:48:31","guid":{"rendered":"http:\/\/twitter.ols3.net\/?p=955"},"modified":"2016-08-23T21:50:01","modified_gmt":"2016-08-23T13:50:01","slug":"pwntools-v3-0-ctf-%e5%87%bd%e5%bc%8f%e5%ba%ab%e6%a1%86%e6%9e%b6-%e6%8e%a8%e5%87%ba%ef%bc%81","status":"publish","type":"post","link":"https:\/\/twitter.ols3.net\/?p=955","title":{"rendered":"Pwntools v3.0 (CTF \u51fd\u5f0f\u5eab\u6846\u67b6) \u63a8\u51fa\uff01"},"content":{"rendered":"<p>Pwntools \u662f\u4e00\u6b3e CTF \u7af6\u8cfd\uff08\u8cc7\u5b89\u6436\u65d7\u653b\u9632\u8cfd\uff09\u6846\u67b6\uff0c\u4ee5\u53ca\u6f0f\u6d1e\u958b\u767c\u7684\u51fd\u5f0f\u5eab\uff0c\u4ee5 Python \u8a2d\u8a08\u800c\u6210\uff08Python 2.7\uff09\u3002<\/p>\n<p>Pwntools \u7db2\u5740\uff1a<a href=\"http:\/\/pwntools.com\/\" target=\"_blank\">http:\/\/pwntools.com\/<\/a><\/p>\n<blockquote><p>pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible.<\/p>\n<div class=\"highlight highlight-source-python\">\n<pre class=\"lang:default decode:true \">from pwn import *\r\ncontext(arch = 'i386', os = 'linux')\r\n\r\nr = remote('exploitme.example.com', 31337)\r\n# EXPLOIT CODE GOES HERE\r\nr.send(asm(shellcraft.sh()))\r\nr.interactive()<\/pre>\n<p>&nbsp;<\/p>\n<\/div>\n<h1><a id=\"try-it-now\" class=\"anchor\" href=\"http:\/\/pwntools.com\/#try-it-now\"><\/a>Try It Now!<\/h1>\n<p>You can now do a live demo of Pwntools, <a href=\"http:\/\/demo.pwntools.com\/\">right in your browser<\/a>. Alternately, you can SSH to the same host, and log in as user <code>zerocool<\/code> with <a href=\"https:\/\/gist.githubusercontent.com\/zachriggle\/efa2e0080ae6de2e8344\/raw\/4b503e9db54f009d97477d03d4ba5678471f8ff0\/id_rsa\">this private key<\/a> (password<code>i_promise_not_to_be_evil<\/code>).<\/p>\n<p>It will drop you into a clean, Docker-ized container. There is nothing of value on the VPS, so please don&#8217;t be evil.<\/p>\n<h1><a id=\"documentation\" class=\"anchor\" href=\"http:\/\/pwntools.com\/#documentation\"><\/a>Documentation<\/h1>\n<p>Our documentation is available at <a href=\"https:\/\/docs.pwntools.com\/\">docs.pwntools.com<\/a><\/p>\n<p>To get you started, we&#8217;ve provided some example solutions for past CTF challenges in our <a href=\"https:\/\/github.com\/Gallopsled\/pwntools-write-ups\">write-ups repository<\/a>.<\/p>\n<h1><a id=\"installation\" class=\"anchor\" href=\"http:\/\/pwntools.com\/#installation\"><\/a>Installation<\/h1>\n<p>pwntools is best supported on 64-bit Ubuntu 12.04 and 14.04, but most functionality should work on any Posix-like distribution (Debian, Arch, FreeBSD, OSX, etc.). Python 2.7 is required.<\/p>\n<p>Most of the functionality of pwntools is self-contained and Python-only. You should be able to get running quickly with<\/p>\n<div class=\"highlight highlight-source-shell\">\n<pre>apt-get update\r\napt-get install python2.7 python-pip python-dev git libssl-dev\r\npip install --upgrade pwntools<\/pre>\n<\/div>\n<p>If you&#8217;d like to be an early tester of the the current beta release, add <code>--pre<\/code> to the command-line.<\/p>\n<p>However, some of the features (assembling\/disassembling foreign architectures) require non-Python dependencies. For more information, see the<a href=\"https:\/\/docs.pwntools.com\/en\/stable\/install.html\">complete installation instructions here<\/a>.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Pwntools \u662f\u4e00\u6b3e CTF \u7af6\u8cfd\uff08\u8cc7\u5b89\u6436\u65d7\u653b\u9632\u8cfd\uff09\u6846\u67b6\uff0c\u4ee5\u53ca\u6f0f\u6d1e\u958b\u767c\u7684\u51fd\u5f0f\u5eab\uff0c\u4ee5 Python \u8a2d\u8a08\u800c\u6210 &hellip; <a href=\"https:\/\/twitter.ols3.net\/?p=955\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Pwntools v3.0 (CTF \u51fd\u5f0f\u5eab\u6846\u67b6) \u63a8\u51fa\uff01<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[127,128],"tags":[],"_links":{"self":[{"href":"https:\/\/twitter.ols3.net\/index.php?rest_route=\/wp\/v2\/posts\/955"}],"collection":[{"href":"https:\/\/twitter.ols3.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/twitter.ols3.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/twitter.ols3.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/twitter.ols3.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=955"}],"version-history":[{"count":2,"href":"https:\/\/twitter.ols3.net\/index.php?rest_route=\/wp\/v2\/posts\/955\/revisions"}],"predecessor-version":[{"id":957,"href":"https:\/\/twitter.ols3.net\/index.php?rest_route=\/wp\/v2\/posts\/955\/revisions\/957"}],"wp:attachment":[{"href":"https:\/\/twitter.ols3.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/twitter.ols3.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/twitter.ols3.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}