源文件ret2libc3
https://www.lanzous.com/i9tkk7a
1、生成输入字符串
pwndbg> cyclic 200
aaaabaaacaaadaaaeaaafaaagaaahaaaiaaajaaakaaalaaamaaanaaaoaaapaaaqaaaraaasaaataaauaaavaaawaaaxaaayaaazaabbaabcaabdaabeaabfaabgaabhaabiaabjaabkaablaabmaabnaaboaabpaabqaabraabsaabtaabuaabvaabwaabxaabyaab
2、运行输入上面字符串
pwndbg> run
Starting program: /home/giantbranch/Desktop/pwn/file/ret2libc3
No surprise anymore, system disappeard QQ.
Can you find it !?aaaabaaacaaadaaaeaaafaaagaaahaaaiaaajaaakaaalaaamaaanaaaoaaapaaaqaaaraaasaaataaauaaavaaawaaaxaaayaaazaabbaabcaabdaabeaabfaabgaabhaabiaabjaabkaablaabmaabnaaboaabpaabqaabraabsaabtaabuaabvaabwaabxaabyaab
3、查看错误提示“Invalid address 0x62616164”

4根据错误地址,查看溢出大小
pwndbg> cyclic -l 0x62616164
112

本文通过实际操作,详细介绍了如何使用ret2libc技术进行漏洞利用。首先,通过生成特定长度的输入字符串来触发缓冲区溢出,然后运行程序并输入该字符串,观察到错误提示Invalid address 0x62616164。接着,利用错误地址确定溢出大小为112字节,为后续的漏洞攻击提供了关键信息。
1183

被折叠的 条评论
为什么被折叠?



