bof(pwnable.kr_bof)缓冲区溢出简单利用

题目传送门:http://pwnable.kr/play.php

下载连接中的源代码和二进制文件后,查看源代码如下

fd_WriteUp(pwnable.kr_fd)Linux文件描述符

本题目来自:http://pwnable.kr/play.php

PKn8Q1.png

首先根据题目提示使用

1
ssh fd@pwnable.kr -p2222

pwnable.kr_mistake

题面:

1
2
3
4
5
6
7
8
9
We all make mistakes, let's move on.
(don't take this too seriously, no fancy hacking skill is required at all)

This task is based on real event
Thanks to dhmonkey

hint : operator priority

ssh mistake@pwnable.kr -p2222 (pw:guest)

提示这道题的要点是运算符的优先级

连上服务器后发现题目文件夹下有四个文件

Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×