-
PCTF-wp
PCTF-WPinkeyWebSign In开靶机,通过chrome的开发者工具找到了flag Reverse学ida与化学gdb把程序拖入ida中即可找到flag baby_python再异或一次即可得到原文 12345678import base64a = 'v|qwk@idx_~O!cObuq!!)Oy~dubucdY~w!i111m'b = []for i in ... -
abstract_shellcode
abstract_shellcodechecksec一下 12345678Arch: amd64-64-little RELRO: Full RELRO Stack: Canary found NX: NX unknown - GNU_STACK missing PIE: PIE enabled Stack: Executa... -
年轻人的第一条博客
Hello World!小菜鸡的pwn之旅