题目对应知识点: like_it:ptrace+uaf shellcode1:ret2shellcode guess:ROP look:32位ret2libc easy_exit:orange worker:unsortedbin attack fate:ret2syscall work_note1:offbynull + large_bin attack easy_str:husk 05ret2libc_64:64位re2libc 题目靶场:https://www.polarctf.com/ 官方邮箱: 3224 2评论...
sys 也是直接的栈溢出,题目是静态链接的,也有直接后门 exp frompwnlib.util.packingimportu64frompwnlib.util.packingimportu32frompwnlib.util.packingimportu16frompwnlib.util.packingimportu8frompwnlib.util.packingimportp64frompwnlib.util.packingimportp32frompwnlib.util.packingimportp16frompwnlib.util.packing...