목록picoCTF 2019/Binary Exploitation (1)
Bace

주어진 코드와 ida를 통해 분석한 코드를 보면 #include #include #include #include #include #define BUFSIZE 148 #define FLAGSIZE 128 void vuln(char *buf){ gets(buf); puts(buf); } int main(int argc, char **argv){ setvbuf(stdout, NULL, _IONBF, 0); // Set the gid to the effective gid // this prevents /bin/sh from dropping the privileges gid_t gid = getegid(); setresgid(gid, gid, gid); char buf[BUFSIZE]; puts("Enter yo..
picoCTF 2019/Binary Exploitation
2020. 6. 6. 11:46