网站介绍:文章浏览阅读595次。NewStarCTFWEEK2uint32 and ret:shellcode-revenge:砍一刀:buffer-flyuint32 and ret:就是个负数转无符号会变为一个很大的数,就能溢出,然后太大也不行read不了,找一下64位无符号int是多少,然后对应减掉一点,用gdb调试一下就知道了,还有就是用ret调一下from pwn import *local_file = './uint'local_libc = '/lib/x86_64-linux-gnu/libc.so.6'_newstarctf 2023 week2
- 链接地址:https://blog.csdn.net/m0_51251108/article/details/127059451
- 链接标题:NewStarCTFWEEK2 pwn题解_newstarctf 2023 week2-CSDN博客
- 所属网站:blog.csdn.net
- 被收藏次数:538
- 网站标签:newstarctf 2023 week2