image
2/24/2024Main function will execute command date +%s and turn the return value into an int, which will be a canary value to prevent stack overflow in read_in. What we can do is knowing that canary by executing date +%s, and use that value to bypass the canary protection. Then all we need to do is overwrite return address to win function address and cat the flag. POC from pwn import * r = process(["date", "+%s"]) canary = int(r.recvline(0).decode()) win = 0x8049296
9/7/2023Đây là một file PE 64 bit, khi mình mở ra và sau khi nhìn quanh một hồi mình nhận thấy chương trình được viết bằng C++, và vẫn còn các symbol của class được để lại:
8/20/2023Welcome ACSC{W3lc0m3_t0_ACSC_2023_g00d_luck!} Merkle Hellman (Crypto) The challenge provides source code of the encryption routine and an encrypted flag file. The only important information in the encryption routine is from this peice of code: # ..... (Not important) # Encrypting c = [] for f in flag:
2/26/2023or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up