CTF-All-In-One/doc/6.1.9_rhme3_exploitation.md

23 lines
766 B
Markdown
Raw Normal View History

2017-12-26 12:37:26 +07:00
# 6.1.9 pwn RHme3 Exploitation
- [题目解析](#题目解析)
- [参考资料](#参考资料)
[下载文件](../src/writeup/6.1.9_rhme3_exploitation)
## 题目解析
```
$ file main.elf
main.elf: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=ec9db5ec0b8ad99b3b9b1b3b57e5536d1c615c8e, not stripped
```
```
$ checksec -f main.elf
RELRO STACK CANARY NX PIE RPATH RUNPATH FORTIFY Fortified Fortifiable FILE
Partial RELRO Canary found NX enabled No PIE No RPATH No RUNPATH Yes 0 10 main.elf
```
## 参考资料
- [Exploitation](https://ctftime.org/task/4528)