Skip to content

Commit 2b9628e

Browse files
committed
complete some excerpt
1 parent d29d12d commit 2b9628e

File tree

3 files changed

+8
-2
lines changed

3 files changed

+8
-2
lines changed

source/_posts/ciscn2024/gostack.md

+5-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: ciscn2024 - gostack
33
date: 2024/5/23 00:47:00
4-
updated: 2024/7/25 12:34:56
4+
updated: 2024/9/11 23:35:00
55
tags:
66
- go
77
- rop
@@ -38,7 +38,6 @@ excerpt: 通过栈溢出控制返回地址,利用Go程序的漏洞成功执行
3838
网上很多wp写rop的链子,很怪,程序不是提供了后门吗。。直接把返回地址修改成`&main.main.func2`
3939
就可以任意执行一个shell命令,输入`cat flag`就可以获得flag
4040

41-
![success](/assets/ciscn2024/success.png)
4241
## EXPLOIT
4342

4443
```python
@@ -62,3 +61,7 @@ def payload(lo:int):
6261

6362
sh.interactive()
6463
```
64+
65+
{% note default fa-flag %}
66+
![success](/assets/ciscn2024/success.png)
67+
{% endnote %}

source/_posts/dasxmarek2024/alphacode.md

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: DASCTF2024八月开学季 - alphacode
33
date: 2024/09/05 00:12:00
44
updated: 2024/09/11 23:05:00
5+
excerpt: 使用`sendfile`系统调用,通过异或解码与`imul`绕过 shellcode 字符限制,逐字节输出flag。
56
tags:
67
- shellcode
78
---

source/_posts/dasxmarek2024/clock.md

+2
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,10 @@
22
title: DASCTF2024八月开学季 - clock
33
date: 2024/09/05 00:15:00
44
updated: 2024/09/13 19:49:00
5+
excerpt: 通过`vsnprintf`格式化漏洞,利用`%*c%6$lln`覆盖`puts@got`为堆地址,执行自定义shellcode。
56
tags:
67
- fmt-string
8+
- tricks
79
---
810

911
{% note green fa-heart %}

0 commit comments

Comments
 (0)