Pwnctf ret2sc Writeup

ret2sc
這題就是先把 shellcode 寫到 name 上,再跳上去就行,不過比較新的作業系統 bss 段沒有 x 權限,這邊就直接上 exploit.py:
1 | from pwn import * |
shellcode 是從這邊找的:
https://www.exploit-db.com/shellcodes/49770
Pwned !!!
- Title: Pwnctf ret2sc Writeup
- Author: kazma
- Created at : 2023-12-20 22:57:23
- Updated at : 2023-12-20 23:03:09
- Link: https://kazma.tw/2023/12/20/Pwnctf-ret2sc-Writeup/
- License: This work is licensed under CC BY-NC-SA 4.0.
Comments