You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+33-23Lines changed: 33 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,21 +1,28 @@
1
-
# Zeratool
1
+
# Zeratool v2.1
2
2
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
3
3
4
4
This tool uses [angr](https://github.com/angr/angr) to concolically analyze binaries by hooking printf and looking for [unconstrained paths](https://github.com/angr/angr-doc/blob/master/docs/examples.md#vulnerability-discovery). These program states are then weaponized for remote code execution through [pwntools](https://github.com/Gallopsled/pwntools) and a series of script tricks. Finally the payload is tested locally then submitted to a remote CTF server to recover the flag.
--force_shellcode Set overflow pwn mode to point to shellcode
37
+
--format_only Only run format strings check
38
+
--overflow_only Only run overflow check
29
39
```
30
40
31
41
## Exploit Types
@@ -35,30 +45,26 @@ Zeratool is designed around weaponizing buffer overflows and format string vulne
35
45
* Point program counter to win function
36
46
* Point program counter to shellcode
37
47
* Point program counter to rop chain
38
-
* Rop chains need a libc base address
39
-
*one-gadget and ropper are used rop chain building
48
+
* Rop chains will attempt to leak a libc function
49
+
*Rop chains will then execve(/bin/sh) or system(/bin/sh)
40
50
* Format String
41
51
* Point GOT entry to win function
42
52
* Point GOT entry to shellcode
43
53
44
-
Zeratool has room to grow and future iterations of Zeratool will include information disclosure discovery and linking those leaks to an offset for general ASLR bypasses.
45
-
46
54
## Examples
47
55
Checkout the samples.sh file. The file contains several examples of Zeratool automatically solving exploitable CTF problems.
48
56
49
-
[Long Asciinema with Three Solves](https://asciinema.org/a/188001)
0 commit comments