We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
https://www.rgzzplus.com/2022/09/05/ret2shellcode/
0x1 题目地址 拿到题目,首先看看文件类型,以及保护机制。 我们发现它缺少执行权限,加上权限后执行,是简单的输入输出,不过这里似乎给到我们了一个地址。 0x2 接下来,把程序拖入 ida,反汇编看看: 我们发现这个程序中并没有关于 flag 的相关信息,所以我们推测 flag 存放在服务器上。 还发现程序通过 read() 把输入存入buf[],也没有保护机制保护栈,这就给了我们栈溢
The text was updated successfully, but these errors were encountered:
No branches or pull requests
https://www.rgzzplus.com/2022/09/05/ret2shellcode/
0x1 题目地址 拿到题目,首先看看文件类型,以及保护机制。 我们发现它缺少执行权限,加上权限后执行,是简单的输入输出,不过这里似乎给到我们了一个地址。 0x2 接下来,把程序拖入 ida,反汇编看看: 我们发现这个程序中并没有关于 flag 的相关信息,所以我们推测 flag 存放在服务器上。 还发现程序通过 read() 把输入存入buf[],也没有保护机制保护栈,这就给了我们栈溢
The text was updated successfully, but these errors were encountered: