靶场
122 篇文章
[CTF.SHOW]36D杯-MagicString
0x00 第一种方法 查找字符串发现了可疑的/bin/ti ROPgadget –binary pwn –string “ti” ...
[Vulnhub]NULLBYTE: 1靶机通关记录
靶机下载地址:戳我 Codename: NB0x01Download: ly0n.me/nullbyte/NullByte.ova.zipObjetci ...
[攻防世界]XCTF 4th-WHCTF-2017:BABYRE
main(): int __cdecl main(int argc, const char **argv, const char **envp) { ...
[攻防世界]2019_UNCTF-666
main()如下: int __cdecl main(int argc, const char **argv, const char **envp) { ...
[Vulnhub]PHOTOGRAPHER: 1靶机通关记录
靶机下载地址:戳我 This machine was developed to prepare for OSCP. It is boot2root, t ...
[攻防世界]PWN-int_overflow
题目提示整型溢出。首先注意到了有直接读取flag的函数: main()分析可得知如果v4 == 1,即可调用login()。 ...
[Vulnhub]PRIME: 1靶机通关记录
靶机下载地址:戳我 This machine is designed for those one who is trying to prepare fo ...