[Vulnhub]PHOTOGRAPHER: 1靶机通关记录
靶机下载地址:戳我
This machine was developed to prepare for OSCP. It is boot2root, t
...
[攻防世界]PWN-int_overflow
题目提示整型溢出。首先注意到了有直接读取flag的函数:
main()分析可得知如果v4 == 1,即可调用login()。
...
[Vulnhub]PRIME: 1靶机通关记录
靶机下载地址:戳我
This machine is designed for those one who is trying to prepare fo
...
[wustctf2020]closed
很短看起来很简单的题目,main()如下:
__int64 vulnerable()
{
puts(“HaHaHa!\nWhat else can
...
[BUUCTF]pwnable_start
题目如下:
public _start
_start proc near
...
[CTF.SHOW]pwn01-My_sword_is_ready
很简单的一道题,vuln()函数如下:
int vuln()
{
int result; // eax
char buf[36]; // [rs
...
[BUUCTF]others_babystack
main函数如下:
__int64 __fastcall main(__int64 a1, char **a2, char **a3)
{
char
...