CTF-All-In-One/doc/6.1.25_pwn_34c3ctf2017_300.md

31 lines
1.0 KiB
Markdown
Raw Normal View History

2018-05-04 21:56:51 +07:00
# 6.1.25 pwn 34C3CTF2017 300
- [题目复现](#题目复现)
- [题目解析](#题目解析)
- [漏洞利用](#漏洞利用)
- [参考资料](#参考资料)
[下载文件](../src/writeup/6.1.25_pwn_34c3ctf2017_300)
## 题目复现
```
$ file 300
300: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=5f43b102f0fe3f3dd770637f1d244384f6b2a1c9, not stripped
$ checksec -f 300
RELRO STACK CANARY NX PIE RPATH RUNPATH FORTIFY Fortified Fortifiable FILE
Full RELRO Canary found NX enabled PIE enabled No RPATH No RUNPATH Yes 0 2 300
$ strings libc.so.6 | grep "GNU C"
GNU C Library (Ubuntu GLIBC 2.24-9ubuntu2.2) stable release version 2.24, by Roland McGrath et al.
Compiled by GNU CC version 6.3.0 20170406.
```
2018-05-05 23:53:49 +07:00
64 位程序 ,开启了 canary、NX 和 PIE默认开启 ASLR。
2018-05-04 21:56:51 +07:00
## 题目解析
## 漏洞利用
## 参考资料
- https://ctftime.org/task/5172