网站首页
编程语言
数据库
系统相关
其他分享
编程问答
0x23
2023-04-02
BUUCTF re/[ACTF新生赛2020]Oruga
[ACTF新生赛2020]Oruga进入sub_78A函数,查看主要逻辑打印迷宫,并确定结果data=[0,0,0,0,0x23,0,0,0,0,0,0,0,0x23,0x23,0x23,0x23,0,0,0,0x23,0x23,0,0,0,0x4F,0x4F,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0x4F,0x4F,0,0x50,0x50,
2022-12-17
buuoj-[ACTF新生赛2020]Oruga
1.无壳64bit2.找到main函数3.进入sub_78A,:_BOOL8__fastcallsub_78A(__int64a1){intv2;//[rsp+Ch][rbp-Ch]intv3;//[rsp+10h][rbp-8h]intv4;//
2022-10-09
封神台靶场2.1以及2.7
先看网站是什么cms插件指纹识别工具然后去查看cms的版本然后下载对应的环境去模拟然后去下载对应版本的cms漏洞寻找pocexp等利用语句第一种用burp抓包改in