I'm trying to exploit the code posted by ir0nstone at this link. I followed any of the steps listed in the tutorial, but Address space layout randomization (ASLR) is not enabled on my machine. When I launch the exploit with python3 exploit.py
, I receive an EOF error.
/home/me/Downloads/shellcode/vuln' Arch: i386-32-little RELRO:Partial RELRO Stack:No canary found NX: NX unknown - GNU\_STACK missing PIE: No PIE (0x8048000) Stack:Executable RWX: Has RWX segments [+] Starting local process '/home/me/Downloads/shellcode/vuln': pid 3880 /home/me/.local/lib/python3.11/site-packages/pwnlib/log.py:396: BytesWarning: Bytes is not text; assuming ASCII, no guarantees. See https://docs.pwntools.com/#bytes self._log(logging.INFO, message, args, kwargs, 'info') [*] Overflow me [*] Switching to interactive mode [*] Got EOF while reading in interactive $ [*] Process '/home/me/Downloads/shellcode/vuln' stopped with exit code -4 (SIGILL) (pid 3880) [*] Got EOF while sending in interactive
The code is the same as the tutorial except for the address in the payload.
Why did I receive the EOF? Is it a Python3 syntax problem of the guide?
strace
orltrace
to figure it out.