Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ret2shellcode | 技术栈 #26

Open
yellowzq opened this issue Sep 6, 2022 · 0 comments
Open

ret2shellcode | 技术栈 #26

yellowzq opened this issue Sep 6, 2022 · 0 comments

Comments

@yellowzq
Copy link
Owner

yellowzq commented Sep 6, 2022

https://www.rgzzplus.com/2022/09/05/ret2shellcode/

0x1 题目地址 拿到题目,首先看看文件类型,以及保护机制。 我们发现它缺少执行权限,加上权限后执行,是简单的输入输出,不过这里似乎给到我们了一个地址。 0x2 接下来,把程序拖入 ida,反汇编看看: 我们发现这个程序中并没有关于 flag 的相关信息,所以我们推测 flag 存放在服务器上。 还发现程序通过 read() 把输入存入buf[],也没有保护机制保护栈,这就给了我们栈溢

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant