[CTF.SHOW]36D杯-MagicString
0x00 第一种方法
查找字符串发现了可疑的/bin/ti
ROPgadget –binary pwn –string “ti”
...
[Vulnhub]NULLBYTE: 1靶机通关记录
靶机下载地址:戳我
Codename: NB0x01Download: ly0n.me/nullbyte/NullByte.ova.zipObjetci
...
[攻防世界]XCTF 4th-WHCTF-2017:BABYRE
main():
int __cdecl main(int argc, const char **argv, const char **envp)
{
...
[攻防世界]2019_UNCTF-666
main()如下:
int __cdecl main(int argc, const char **argv, const char **envp)
{
...
[Vulnhub]PHOTOGRAPHER: 1靶机通关记录
靶机下载地址:戳我
This machine was developed to prepare for OSCP. It is boot2root, t
...
[攻防世界]PWN-int_overflow
题目提示整型溢出。首先注意到了有直接读取flag的函数:
main()分析可得知如果v4 == 1,即可调用login()。
...
[Vulnhub]PRIME: 1靶机通关记录
靶机下载地址:戳我
This machine is designed for those one who is trying to prepare fo
...