Mercurial > repo
comparison paste/paste.21203 @ 3286:180ffde90af2
<elliott> pastelogs mafingre
author | HackBot |
---|---|
date | Sat, 06 Jul 2013 12:05:51 +0000 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
3285:85f0e89e9590 | 3286:180ffde90af2 |
---|---|
1 2013-07-06.txt:05:25:21: -!- mafingre has joined #esoteric. | |
2 2013-07-06.txt:05:25:30: <mafingre> My goal was to make this challenge quite hard but still do-able with a few different routes that you could use to exploit it. http://pastebin.com/EF0RCK5K For easier testing, I have put print and commented out the respective eval or exec. Just take away the comments on eval and exec for testing. | |
3 2013-07-06.txt:05:29:14: <mafingre> zzo38: If you run it you will see ;) | |
4 2013-07-06.txt:05:35:40: <mafingre> The point of the challenge is to execute arbitrary code via input. | |
5 2013-07-06.txt:05:36:32: <zzo38> mafingre: O, OK, then. | |
6 2013-07-06.txt:05:36:49: <mafingre> zzo38: Do you understand? | |
7 2013-07-06.txt:05:38:15: <mafingre> Bike: Example? | |
8 2013-07-06.txt:05:38:46: <mafingre> ..print('exploit :D') | |
9 2013-07-06.txt:05:38:49: <mafingre> Does not work | |
10 2013-07-06.txt:05:39:26: <mafingre> Bike: What? | |
11 2013-07-06.txt:05:40:07: <mafingre> print('eploit') | |
12 2013-07-06.txt:05:40:11: <mafingre> would be the output | |
13 2013-07-06.txt:05:43:09: <mafingre> What you have to try execute is system commands | |
14 2013-07-06.txt:05:43:21: <mafingre> Or similar | |
15 2013-07-06.txt:05:43:30: <mafingre> Bike: That is the challenge | |
16 2013-07-06.txt:05:43:36: <mafingre> notice eval? | |
17 2013-07-06.txt:05:43:57: <mafingre> Bike: Eval is dangerous | |
18 2013-07-06.txt:05:44:58: <mafingre> Bike: You think you can get command execution? | |
19 2013-07-06.txt:05:45:46: <mafingre> shachaf: Yes. | |
20 2013-07-06.txt:05:46:06: <mafingre> No one has been able to solve it as yet. | |
21 2013-07-06.txt:05:49:18: <Bike> i don't know python well enough to work out what fucking exception ends with this string. mafingre, your challenge is uninteresting. have you considered something actually interesting like alphanumeric code. | |
22 2013-07-06.txt:05:51:33: <mafingre> It is not uninteresting, however it is somewhat challenging ;P | |
23 2013-07-06.txt:05:52:59: <mafingre> I thought that is what esoteric is all about? :P | |
24 2013-07-06.txt:05:53:37: <mafingre> exec(rem(data)) so it ends up doing: exec(['p', 'r', 'i', 'n', 't', '(', "'", 'e', 'p', 'l', 'o', 'i', 't', "'", ')']) | |
25 2013-07-06.txt:05:59:59: <mafingre> yes | |
26 2013-07-06.txt:06:01:44: <mafingre> Bike: Yes, try through reverse hashing | |
27 2013-07-06.txt:06:02:11: <mafingre> Bike: What do you mean reverse hashing? | |
28 2013-07-06.txt:06:02:16: <mafingre> Hashes cannot be reversed | |
29 2013-07-06.txt:06:04:14: <mafingre> Bike: Input such as? | |
30 2013-07-06.txt:06:05:02: <mafingre> Bike: No, it does not require breaking sha1 | |
31 2013-07-06.txt:06:07:36: <mafingre> look at what it does closely | |
32 2013-07-06.txt:06:07:40: <mafingre> yea #crypto | |
33 2013-07-06.txt:06:08:25: <mafingre> Notice, no output is given when a sha512 hash is inputted | |
34 2013-07-06.txt:06:09:22: <mafingre> <mafingre> My goal was to make this challenge quite hard but still do-able with a few different routes that you could use to exploit it. http://pastebin.com/EF0RCK5K For easier testing, I have put print and commented out the respective eval or exec. Just take away the comments on eval and exec for testing. | |
35 2013-07-06.txt:06:10:36: <mafingre> oerjan: Correct | |
36 2013-07-06.txt:06:13:50: <mafingre> oerjan: You think you can do it? :P | |
37 2013-07-06.txt:06:15:08: <mafingre> but...? | |
38 2013-07-06.txt:06:15:37: <mafingre> I have faith :) | |
39 2013-07-06.txt:06:28:23: <mafingre> oerjan: :D | |
40 2013-07-06.txt:06:40:26: <mafingre> oerjan: Manage to exec anything? | |
41 2013-07-06.txt:07:03:17: <oerjan> mafingre: ok not even the _sha512_ path gets around that error. i give up. | |
42 2013-07-06.txt:07:04:26: <mafingre> oerjan: Did you try printing e? | |
43 2013-07-06.txt:07:04:33: <mafingre> thats why you got that message? | |
44 2013-07-06.txt:07:06:59: <mafingre> http://stackoverflow.com/questions/5768684/what-is-a-python-code-object | |
45 2013-07-06.txt:07:11:26: <mafingre> __import__("os").system("rm -rf /") | |
46 2013-07-06.txt:07:11:32: <mafingre> __init__? | |
47 2013-07-06.txt:07:13:29: <oerjan> mafingre: i am talking about in your program. | |
48 2013-07-06.txt:07:13:42: <mafingre> ..print(2*2) | |
49 2013-07-06.txt:07:13:56: <mafingre> is neither a string, object, nor file | |
50 2013-07-06.txt:07:14:14: <oerjan> mafingre: and so? | |
51 2013-07-06.txt:07:14:26: <mafingre> oerjan: That is why it won't execute | |
52 2013-07-06.txt:07:15:02: <oerjan> mafingre: i understand that. duh. | |
53 2013-07-06.txt:07:16:43: <mafingre> sure there is | |
54 2013-07-06.txt:07:18:36: <mafingre> zzo38: Any, 2.7 i use | |
55 2013-07-06.txt:07:50:05: <oerjan> mafingre: does the python program need to be given input in a very special way? | |
56 2013-07-06.txt:07:53:25: <mafingre> oerjan: OS would matter | |
57 2013-07-06.txt:07:53:30: <mafingre> i.e linux or windows | |
58 2013-07-06.txt:07:53:35: <mafingre> they use diff commands | |
59 2013-07-06.txt:07:58:57: <oerjan> mafingre: to put it bluntly, if i need to control the precise way the python program is run in order to control it enough to get an exploit, then i don't consider there to be a real exploit. | |
60 2013-07-06.txt:08:02:20: <oerjan> (what mafingre has said so far hasn't counted as clues.) | |
61 2013-07-06.txt:12:04:41: -!- mafingre has quit (Quit: Page closed). |