CTF-All-In-One/doc/6.1.32_pwn_secconctf2017_vm_no_fun.md

31 lines
1.1 KiB
Markdown
Raw Normal View History

2018-06-08 19:46:05 +07:00
# 6.1.32 pwn SECCONCTF2017 vm_no_fun
- [题目复现](#题目复现)
- [题目解析](#题目解析)
- [漏洞利用](#漏洞利用)
- [参考资料](#参考资料)
[下载文件](../src/writeup/6.1.32_pwn_secconctf2017_vm_no_fun)
## 题目复现
```
$ file inception
inception: ELF 64-bit LSB pie executable x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=c36d0c2ef8cae7c5166fa8e3cc30a229f97968c3, stripped
$ checksec -f inception
RELRO STACK CANARY NX PIE RPATH RUNPATH FORTIFY Fortified Fortifiable FILE
Partial RELRO Canary found NX enabled PIE enabled No RPATH No RUNPATH Yes 0 3 inception
$ strings libc-2.23.so | grep "GNU C"
GNU C Library (Ubuntu GLIBC 2.23-0ubuntu9) stable release version 2.23, by Roland McGrath et al.
Compiled by GNU CC version 5.4.0 20160609.
```
64 位程序,开启了 canary、NX 和 PIE默认开启 ASLR。
## 题目解析
## 漏洞利用
## 参考资料
- https://github.com/SECCON/SECCON2017_online_CTF/tree/master/pwn/500_vm_no_fun