File tree 3 files changed +8
-2
lines changed
3 files changed +8
-2
lines changed Original file line number Diff line number Diff line change 1
1
---
2
2
title : ciscn2024 - gostack
3
3
date : 2024/5/23 00:47:00
4
- updated : 2024/7/25 12:34:56
4
+ updated : 2024/9/11 23:35:00
5
5
tags :
6
6
- go
7
7
- rop
@@ -38,7 +38,6 @@ excerpt: 通过栈溢出控制返回地址,利用Go程序的漏洞成功执行
38
38
网上很多wp写rop的链子,很怪,程序不是提供了后门吗。。直接把返回地址修改成` &main.main.func2 ` ,
39
39
就可以任意执行一个shell命令,输入` cat flag ` 就可以获得flag
40
40
41
- ![ success] ( /assets/ciscn2024/success.png )
42
41
## EXPLOIT
43
42
44
43
``` python
@@ -62,3 +61,7 @@ def payload(lo:int):
62
61
63
62
sh.interactive()
64
63
```
64
+
65
+ {% note default fa-flag %}
66
+ ![ success] ( /assets/ciscn2024/success.png )
67
+ {% endnote %}
Original file line number Diff line number Diff line change 2
2
title : DASCTF2024八月开学季 - alphacode
3
3
date : 2024/09/05 00:12:00
4
4
updated : 2024/09/11 23:05:00
5
+ excerpt : 使用`sendfile`系统调用,通过异或解码与`imul`绕过 shellcode 字符限制,逐字节输出flag。
5
6
tags :
6
7
- shellcode
7
8
---
Original file line number Diff line number Diff line change 2
2
title : DASCTF2024八月开学季 - clock
3
3
date : 2024/09/05 00:15:00
4
4
updated : 2024/09/13 19:49:00
5
+ excerpt : 通过`vsnprintf`格式化漏洞,利用`%*c%6$lln`覆盖`puts@got`为堆地址,执行自定义shellcode。
5
6
tags :
6
7
- fmt-string
8
+ - tricks
7
9
---
8
10
9
11
{% note green fa-heart %}
You can’t perform that action at this time.
0 commit comments