| ID: | 782 |
|---|---|
| 标题: | Quick Mafs |
| 描述: | Oops! I dropped all of these arithmetic gadgets. Fortunately there are enough of them that you won't be able to pick out the right ones.... right? This is an automatic reversing & exploitation challenge. The server will send you (in order) an instruction (they will be in the format "call print() with rax = 0x1234\n") and an ELF binary as a newline terminated hex string. You should analyze the binary, construct a payload to accomplish that, and then send it back to the server as a newline term |
| 类型: | PWN |
| 网站: | bugku |
| 题目链接: | https://ctf.bugku.com/challenges/detail/id/913.html |
| 赛事: | TAMUctf2022 |
| 年度: | 2022 |
| Flag值: | gigem{d0nt_us3_t3lnet_ev3r} |
| writeup: | https://hhyleung.github.io/writeups/tamuctf-2022/ |