[随波逐流]CTF Flags

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
返    回

Swix

 广告模块
ID: 2065
标题: Swix
描述: Notes: Source code was given to help with debugging. Exploiting the dlresolve function to call system("sh") System has access to environment variables (PATH) therefore, calling system("sh") would work perfectly fine. Puts uses heap before printing a message therefore, by leaking a heap address, you can calc the address of "I'm safe! I wish" stored in heap & should be able to use the last "sh" for the system call. The dlresolve payload must be crafted manually in the given structures. The addresses are aligned. Use magicMove to call the dlresolve function. Unintended by Robbert1978 (Discord tag) One of the unintended solutions caught my interest, which is this one. The unintended solution consists of creating a 1 argument function call primitive. That's one creative way to do it. Link for writeup/solver & blog: Link
类型: PWN
网站: bugku
题目链接: https://ctf.bugku.com/challenges/detail/id/2212.html
赛事: SecurinetsQualsCTF2023
年度: 2023
Flag值: Swix题目的解题过程涉及路径穿越读取/proc/self/maps泄露地址、利用updateConfig序号溢出修改配置、在mmap内存写入shellcode等技术 2。验证后的解题过程及代码详见知乎专栏文章: Swix的解题方法
writeup: https://zhuanlan.zhihu.com/p/649938547
答案错误,我要更正