(pwn)基本ROP的几个例子(三)
2018-12-02 本文已影响0人
鸡龙
五、ret2libc
1)ret2libc1
checksec ret2libc1

IDA伪代码

gdb调试

计算返回地址偏移量得出112
找/bin/sh地址

找到system函数地址

payload

运行

2)ret2libc2
checksec ret2libc2

与上题基本一致,只在找/bin/sh时找不到,需要自己控制ebx读取
gadget一下ebx,地址0x0804843d

在IDA里面找出buf2,地址0x0804A080

调用get读取字符串,地址:0x08048460

系统调用system(),地址:0X08048490

payload

运行
