标签:HERE roc 题目 xpl context log ati until drop
忘了上次打什么比赛碰到过一次aeg(auto exploit generation)的题目,正好看到pwnable.kr上有一个aeg,顺便拿来分析下
首先写个脚本抓几个程序看看
from pwn import * import subprocess context.log_level=‘info‘ r=remote(‘pwnable.kr‘,9005) r.recvuntil(‘wait...‘) con=r.recvuntil(‘\nhere,‘,drop=True) fname=‘aeg‘ f=open(fname,‘w‘) f.write(b64d(con)) f.close() subprocess.call(‘zcat {} > {}bin‘.format(fname,fname),shell=True) subprocess.call(‘chmod +x {}bin‘.format(fname),shell=True)
标签:HERE roc 题目 xpl context log ati until drop
原文地址:https://www.cnblogs.com/snip3r/p/11254404.html