[随波逐流]CTF Flags

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
返    回

Quick Mafs

 广告模块
ID: 782
标题: Quick Mafs
描述: Oops! I dropped all of these arithmetic gadgets. Fortunately there are enough of them that you won't be able to pick out the right ones.... right? This is an automatic reversing & exploitation challenge. The server will send you (in order) an instruction (they will be in the format "call print() with rax = 0x1234\n") and an ELF binary as a newline terminated hex string. You should analyze the binary, construct a payload to accomplish that, and then send it back to the server as a newline term
类型: PWN
网站: bugku
题目链接: https://ctf.bugku.com/challenges/detail/id/913.html
赛事: TAMUctf2022
年度: 2022
Flag值: gigem{d0nt_us3_t3lnet_ev3r}
writeup: https://hhyleung.github.io/writeups/tamuctf-2022/
答案错误,我要更正