• 2023-04-02BUUCTF re/[ACTF新生赛2020]Oruga
    [ACTF新生赛2020]Oruga进入sub_78A函数,查看主要逻辑打印迷宫,并确定结果data=[0,0,0,0,0x23,0,0,0,0,0,0,0,0x23,0x23,0x23,0x23,0,0,0,0x23,0x23,0,0,0,0x4F,0x4F,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0x4F,0x4F,0,0x50,0x50,
  • 2022-12-17buuoj-[ACTF新生赛2020]Oruga
    1.无壳64bit2.找到main函数3.进入sub_78A,:_BOOL8__fastcallsub_78A(__int64a1){intv2;//[rsp+Ch][rbp-Ch]intv3;//[rsp+10h][rbp-8h]intv4;//
  • 2022-10-09封神台靶场2.1以及2.7
    先看网站是什么cms插件指纹识别工具然后去查看cms的版本然后下载对应的环境去模拟然后去下载对应版本的cms漏洞寻找pocexp等利用语句第一种用burp抓包改in