[DASCTF 2022]WEB-ezpop
题目如下:
<?php
class crow
{
public $v1;
public $v2;
function e
...
[CTF.SHOW]36D杯-MagicString
0x00 第一种方法
查找字符串发现了可疑的/bin/ti
ROPgadget –binary pwn –string “ti”
...
[攻防世界]XCTF 4th-WHCTF-2017:BABYRE
main():
int __cdecl main(int argc, const char **argv, const char **envp)
{
...
[攻防世界]2019_UNCTF-666
main()如下:
int __cdecl main(int argc, const char **argv, const char **envp)
{
...
[攻防世界]PWN-int_overflow
题目提示整型溢出。首先注意到了有直接读取flag的函数:
main()分析可得知如果v4 == 1,即可调用login()。
...
[wustctf2020]closed
很短看起来很简单的题目,main()如下:
__int64 vulnerable()
{
puts(“HaHaHa!\nWhat else can
...
[BUUCTF]pwnable_start
题目如下:
public _start
_start proc near
...