摘要: sudo sysctl -w kernel.randomize_va_space=0 gcc -fno-stack-protector example.c gcc -z execstack -o test test.c /* call_shellcode.c / / 设置四个寄存器eax,ebx,e 阅读全文
posted @ 2022-10-30 16:02 kkk55555 阅读(148) 评论(0) 推荐(0)
摘要: sudo sysctl -w kernel.randomize_va_space=0 sudo su cd /bin rm sh ln -s zsh sh /* stack.c / / This program has a buffer overflow vulnerability. / / Our 阅读全文
posted @ 2022-10-29 21:49 kkk55555 阅读(155) 评论(0) 推荐(0)