← BACK TO CHALLENGES
REVERSE

ASM

Assembly Shellcode
300
POINTS
DESCRIPTION
The server allocates an rwx memory page, reads your shellcode into it, and jumps to it. You must write x86-64 assembly that: Opens /home/asm/this_is_pwnable.kr_flag with syscall open (rax=2), reads file contents into a buffer with syscall read (rax=0), then writes the buffer to stdout with syscall write (rax=1). Assemble with nasm, send the raw bytes via netcat.
HOW TO CONNECT
Connect via netcat: nc pwnable.kr 9026 Assemble and send shellcode: nasm -f bin shellcode.asm -o shellcode.bin cat shellcode.bin | nc pwnable.kr 9026 Or with pwntools: from pwn import * context.arch = "amd64" r = remote("pwnable.kr", 9026) sc = asm(your_shellcode_here) r.send(sc) print(r.recvall())
nc pwnable.kr 9026
SUBMIT FLAG
Login or register to submit flags and earn points.
Flags are found on the challenge server after successful exploitation.