add 6.1.12

This commit is contained in:
firmianay
2018-03-16 21:04:38 +08:00
parent bce95a5b08
commit 69b85812eb
9 changed files with 225 additions and 2 deletions

View File

@ -0,0 +1,42 @@
# 6.1.12 pwn N1CTF2018 vote
- [题目复现](#题目复现)
- [题目解析](#题目解析)
- [参考资料](#参考资料)
[下载文件](../src/writeup/6.1.12_n1ctf2018_vote)
## 题目复现
这个题目给了二进制文件和 libc
```
$ file vote
vote: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=53266adcfdcb7b21a01e9f2a1cb0396b818bfba3, stripped
$ checksec -f vote
RELRO STACK CANARY NX PIE RPATH RUNPATH FORTIFY Fortified Fortifiable FILE
Partial RELRO Canary found NX enabled No PIE No RPATH No RUNPATH Yes 0 4 vote
```
看起来就是个堆利用的问题:
```
$ ./vote
0: Create
1: Show
2: Vote
3: Result
4: Cancel
5: Exit
Action:
```
然后就可以把它运行起来了:
```
$ socat tcp4-listen:10001,reuseaddr,fork exec:"env LD_PRELOAD=./libc-2.23.so ./vote" &
```
## 题目解析
#### Exploit
## 参考资料
https://ctftime.org/task/5490

View File

@ -2,6 +2,7 @@
- [题目解析](#题目解析)
- [Exploit](#exploit)
- [参考资料](#参考资料)
[下载文件](../src/writeup/6.1.5_pwn_grehackctf2017_beerfighter)
@ -182,3 +183,7 @@ payload_2 += str(frame_2)
io.sendline(payload_2)
io.interactive()
```
## 参考资料
https://ctftime.org/task/4939

View File

@ -970,4 +970,4 @@ p.interactive()
## 参考资料
- [Exploitation](https://ctftime.org/task/4528)
https://ctftime.org/task/4528

View File

@ -4,7 +4,7 @@
- [参考资料](#参考资料)
章节 4.5 中讲解了 Z3 约束求解器的基本使用方法,通过这一题,我们可以更进一步地熟悉它。
章节 5.8.1 中讲解了 Z3 约束求解器的基本使用方法,通过这一题,我们可以更进一步地熟悉它。
[下载文件](../src/writeup/6.2.2_re_ectf2016_tayy)

View File

@ -12,6 +12,7 @@
- [6.1.9 pwn RHme3 Exploitation](6.1.9_rhme3_exploitation.md)
- [6.1.10 pwn 0CTF2017 BabyHeap2017](6.1.10_0ctf2017_babyheap2017.md)
- [6.1.11 pwn 9447CTF2015 Search-Engine](6.1.11_9447ctf2015_search_engine.md)
- [6.1.12 pwn N1CTF2018 vote](6.1.12_n1ctf2018_vote.md)
- re
- [6.2.1 re XHPCTF2017 dont_panic](6.2.1_re_xhpctf2017_dont_panic.md)
- [6.2.2 re ECTF2016 tayy](6.2.2_re_ectf2016_tayy.md)