- Published on
Stack
- Published on
通过控制 `gets` 的写入位置,把 shellcode 放在预设的地方。相比以前不确定的 shellcode 位置,这种方法让我们对 shellcode 的控制更加精确可靠。- Published on
- Published on
使用格式化字符串漏洞覆盖 GOT 表 get shell- Published on
GOT 表存储了动态链接函数的真实地址。如果能修改其中的某个函数地址,就可以控制程序的执行流程。- Published on
使用 ROP 指定 shellcode 的写入位置- Published on
绕过 ASLR- Published on
- Published on
- Published on
绕过 ASLR- Published on
无已知地址绕过 PIE- Published on
32-bit 与 64-bit 之间的差异- Published on
- Published on
- Published on
- Published on
这篇博客记录了 `pwntools` 库中一些实用的功能。- Published on
- Published on
- Published on
- Published on
- Published on
32-bit 与 64-bit 之间的差异- Published on
计算偏移量的方法- Published on
你的输入将被存储为数据,任何将其作为指令运行的尝试都会使程序崩溃,从而有效地阻止 shellcode。- Published on
- Published on
- Published on
- Published on
- Published on