3 # RuCTFe 2014 Exploit Template
7 # Which sub-IP-address is this service running on?
12 # Implement your exploit here.
14 # The following utility functions are there for you:
17 # self.recv_until(magic_str)
20 # self.submit_flag(flag)
22 class Exploit(ctfutil.ExploitBase):
24 self.logger.debug(self.recv_until(': '))
25 self.submit_flag(self.recv_all().decode('ascii').strip())
28 if __name__ == '__main__':
29 ctfutil.AttackTool(Exploit, subservice=SUBSERVICE).run()