1

I'm trying to exploit the code posted by ir0nstone at this link. I followed any of the steps listed in the tutorial, but Address space layout randomization (ASLR) is not enabled on my machine. When I launch the exploit with python3 exploit.py, I receive an EOF error.

/home/me/Downloads/shellcode/vuln' Arch: i386-32-little RELRO:Partial RELRO Stack:No canary found NX: NX unknown - GNU\_STACK missing PIE: No PIE (0x8048000) Stack:Executable RWX: Has RWX segments [+] Starting local process '/home/me/Downloads/shellcode/vuln': pid 3880 /home/me/.local/lib/python3.11/site-packages/pwnlib/log.py:396: BytesWarning: Bytes is not text; assuming ASCII, no guarantees. See https://docs.pwntools.com/#bytes self._log(logging.INFO, message, args, kwargs, 'info') [*] Overflow me [*] Switching to interactive mode [*] Got EOF while reading in interactive $ [*] Process '/home/me/Downloads/shellcode/vuln' stopped with exit code -4 (SIGILL) (pid 3880) [*] Got EOF while sending in interactive 

The code is the same as the tutorial except for the address in the payload.

Why did I receive the EOF? Is it a Python3 syntax problem of the guide?

6
  • It seems like the process exited already...CommentedMay 27, 2024 at 19:33
  • Sure, but why? And at least I didn't receive any shell.
    – xChineze
    CommentedMay 27, 2024 at 22:26
  • You need to check the last exit code from within the shell and then use something like strace or ltrace to figure it out.CommentedMay 28, 2024 at 10:25
  • It might be something primitive as AppArmor/SELinux or something more complex, but you need to do your own research ;-)CommentedMay 28, 2024 at 10:26
  • Yes, I know man. I was struggling for days before asking help, thanks for your contribute.
    – xChineze
    CommentedMay 28, 2024 at 14:46

0

You must log in to answer this question.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.