mirror of
https://github.com/nganhkhoa/CTF-All-In-One.git
synced 2024-12-24 03:01:15 +07:00
fix; add 6.2
This commit is contained in:
parent
bcd42d7ef1
commit
c9f7382eec
@ -67,6 +67,7 @@
|
||||
|
||||
- [六、题解篇](doc/6_writeup.md)
|
||||
- [6.1 pwn hctf2016 brop](doc/6.1_pwn_hctf2016_brop.md)
|
||||
- [6.2 pwn 0ctf2015 freenote](doc/6.2_pwn_0ctf2015_freenote.md)
|
||||
|
||||
- [七、附录](doc/7_appendix.md)
|
||||
- [7.1 更多 Linux 工具](doc/7.1_Linuxtools.md)
|
||||
|
@ -63,6 +63,7 @@
|
||||
* [5.7 Capstone/Keystone](doc/5.7_cap-keystone.md)
|
||||
* [六、题解篇](doc/6_writeup.md)
|
||||
* [6.1 pwn hctf2016 brop](doc/6.1_pwn_hctf2016_brop.md)
|
||||
* [6.2 pwn 0ctf2015 freenote](doc/6.2_pwn_0ctf2015_freenote.md)
|
||||
* [七、附录](doc/7_appendix.md)
|
||||
* [7.1 更多 Linux 工具](doc/7.1_Linuxtools.md)
|
||||
* [7.2 更多 Windows 工具](doc/7.2_wintools.md)
|
||||
|
@ -58,7 +58,7 @@ done
|
||||
在一个单独的 shell 中运行它,这样我们就简单模拟出了比赛时的环境,即仅提供 ip 和端口。(不停地断开重连特别耗CPU,建议在服务器上跑)
|
||||
|
||||
|
||||
## BROP 原理和题目解析
|
||||
## BROP 原理及题目解析
|
||||
BROP 即 Blind ROP,需要我们在无法获得二进制文件的情况下,通过 ROP 进行远程攻击,劫持该应用程序的控制流,可用于开启了 ASLR、NX和栈canaries的 64-bit Linux。这一概念是是在 2014 年提出的,论文和幻灯片在参考资料中。
|
||||
|
||||
实现这一攻击有两个必要条件:
|
||||
@ -367,8 +367,8 @@ firmy
|
||||
```
|
||||
|
||||
|
||||
## Expolit
|
||||
完整的 exp 如下,其他文件放在了github相应文件夹中:
|
||||
## Exploit
|
||||
完整的 exp 如下,其他文件放在了[github](../src/writeup/6.1_pwn_hctf2016_brop)相应文件夹中:
|
||||
```python
|
||||
from pwn import *
|
||||
|
||||
|
1
doc/6.2_pwn_0ctf2015_freenote.md
Normal file
1
doc/6.2_pwn_0ctf2015_freenote.md
Normal file
@ -0,0 +1 @@
|
||||
# 6.2 pwn 0ctf2015 freenote
|
@ -1,3 +1,4 @@
|
||||
# 第六章 题解篇
|
||||
|
||||
- [6.1 pwn hctf2016 brop](./6.1_pwn_hctf2016_brop.md)
|
||||
- [6.2 pwn 0ctf2015 freenote](./6.2_pwn_0ctf2015_freenote.md)
|
||||
|
Loading…
Reference in New Issue
Block a user