上一页 1 ··· 5 6 7 8 9 10 11 12 13 ··· 26 下一页
摘要: http://idea.lanyus.com/ 阅读全文
posted @ 2019-06-11 09:21 heycomputer 阅读(1111) 评论(0) 推荐(0)
摘要: Ok, first off, we need to create our malicious "shellcode payload"... I have a few examples below of some possible payloads we could be using. 1. Down 阅读全文
posted @ 2019-06-10 16:29 heycomputer 阅读(1380) 评论(0) 推荐(0)
摘要: APP: https://github.com/ctf-wiki/ctf-challenges/raw/master/pwn/stackoverflow/ret2shellcode/ret2shellcode-example/ret2shellcode Tools: gef pwntools ltr 阅读全文
posted @ 2019-06-09 14:23 heycomputer 阅读(357) 评论(0) 推荐(0)
摘要: APP: https://github.com/ctf-wiki/ctf-challenges/raw/master/pwn/stackoverflow/ret2text/bamboofox-ret2text/ret2text TOOLS: pwntools gef gdb objdump read 阅读全文
posted @ 2019-06-09 10:14 heycomputer 阅读(345) 评论(0) 推荐(0)
摘要: APP: https://github.com/ctf-wiki/ctf-challenges/raw/master/pwn/stackoverflow/ret2libc/ret2libc1/ret2libc1 https://github.com/ctf-wiki/ctf-challenges/r 阅读全文
posted @ 2019-06-06 17:51 heycomputer 阅读(339) 评论(0) 推荐(0)
摘要: APP: https://github.com/ctf-wiki/ctf-challenges/raw/master/pwn/stackoverflow/ret2syscall/bamboofox-ret2syscall/rop TOOLS: Gef plugin of gdb ROPgadget 阅读全文
posted @ 2019-06-05 19:13 heycomputer 阅读(802) 评论(0) 推荐(0)
摘要: App:ret2win https://ropemporium.com/binary/ret2win.zip https://ropemporium.com/binary/ret2win32.zip Target:Locate a method within the binary that you 阅读全文
posted @ 2019-06-05 08:20 heycomputer 阅读(243) 评论(0) 推荐(0)
摘要: 1. Config JDK variable path. # export JAVA_HOME=/Library/Java/JavaVirtualMachines/jdk1.8.0_211.jdk/Contents/Home/jre 2.Create resource path. We could 阅读全文
posted @ 2019-06-04 19:28 heycomputer 阅读(455) 评论(0) 推荐(0)
摘要: 1.[fd] fd@ubuntu:~$ cat fd.c #include <stdio.h> #include <stdlib.h> #include <string.h> char buf[32]; int main(int argc, char* argv[], char* envp[]){ 阅读全文
posted @ 2019-06-02 18:03 heycomputer 阅读(286) 评论(0) 推荐(0)
摘要: https://www.ovh.com/world/vps/vps-ssd.xml 阅读全文
posted @ 2019-05-18 18:21 heycomputer 阅读(179) 评论(0) 推荐(0)
上一页 1 ··· 5 6 7 8 9 10 11 12 13 ··· 26 下一页