靶场
125 篇文章
[Vulnhub]PHOTOGRAPHER: 1靶机通关记录
靶机下载地址:戳我 This machine was developed to prepare for OSCP. It is boot2root, t ...
[攻防世界]PWN-int_overflow
题目提示整型溢出。首先注意到了有直接读取flag的函数: main()分析可得知如果v4 == 1,即可调用login()。 ...
[Vulnhub]PRIME: 1靶机通关记录
靶机下载地址:戳我 This machine is designed for those one who is trying to prepare fo ...
[wustctf2020]closed
很短看起来很简单的题目,main()如下: __int64 vulnerable() { puts(“HaHaHa!\nWhat else can ...
[BUUCTF]pwnable_start
题目如下: public _start _start proc near ...
[CTF.SHOW]pwn01-My_sword_is_ready
很简单的一道题,vuln()函数如下: int vuln() { int result; // eax char buf[36]; // [rs ...
[BUUCTF]others_babystack
main函数如下: __int64 __fastcall main(__int64 a1, char **a2, char **a3) { char ...