Loading

摘要: via:https://ropemporium.com/challenge/fluff.html fluff The concept here is identical to the write4 challenge. The only difference is we may struggle t 阅读全文
posted @ 2020-05-22 22:04 scriptk1d 阅读(249) 评论(0) 推荐(0) 编辑
摘要: via:https://ropemporium.com/challenge/badchars.html badchars An arbitrary write challenge with a twist; certain input characters get mangled before fi 阅读全文
posted @ 2020-05-22 21:52 scriptk1d 阅读(365) 评论(0) 推荐(0) 编辑
摘要: via:https://ropemporium.com/challenge/write4.html write4 Our first foray into proper gadget use. A call to system() is still present but we'll need to 阅读全文
posted @ 2020-05-22 21:48 scriptk1d 阅读(247) 评论(0) 推荐(0) 编辑
摘要: via:https://ropemporium.com/challenge/split.html split In this challenge the elements that allowed you to complete the ret2win challenge are still pre 阅读全文
posted @ 2020-05-22 21:44 scriptk1d 阅读(199) 评论(0) 推荐(0) 编辑
摘要: via:https://ropemporium.com/challenge/ret2win.html ret2win Locate a method within the binary that you want to call and do so by overwriting a saved re 阅读全文
posted @ 2020-05-22 21:39 scriptk1d 阅读(241) 评论(0) 推荐(0) 编辑
摘要: STACK FIVE As opposed to executing an existing function in the binary, this time we’ll be introducing the concept of “shell code”, and being able to e 阅读全文
posted @ 2020-05-22 21:35 scriptk1d 阅读(331) 评论(0) 推荐(0) 编辑
摘要: STACK FOUR Stack Four takes a look at what can happen when you can overwrite the saved instruction pointer (standard buffer overflow). Hints The saved 阅读全文
posted @ 2020-05-22 21:34 scriptk1d 阅读(180) 评论(0) 推荐(0) 编辑
摘要: STACK THREE Stack Three looks at overwriting function pointers stored on the stack. Hints You can use gdb and objdump to determine where the complete_ 阅读全文
posted @ 2020-05-22 21:32 scriptk1d 阅读(194) 评论(0) 推荐(0) 编辑
摘要: STACK ONE This level looks at the concept of modifying variables to specific values in the program, and how the variables are laid out in memory. This 阅读全文
posted @ 2020-05-22 21:29 scriptk1d 阅读(232) 评论(0) 推荐(0) 编辑
摘要: 太闲了看了一下 fork 在内核里面的工作 内核版本:Linux kernel 5.6.14 via: "https://elixir.bootlin.com/linux/v5.6.14/source/kernel/fork.c L2522" 其实在内核里面 `vfork clone _do_for 阅读全文
posted @ 2020-05-22 18:07 scriptk1d 阅读(747) 评论(0) 推荐(0) 编辑