Writeups / Notes / Practice

haoo's pwn house

Pwn / CTF writeups, binary exploitation notes, and practice logs.

ISCTF_2021_pwn

杰哥的nc一道有意思的nc题目,没有给我们附件,直接nc连接一下 $ python3 nc_exp.py [+] Opening connection to challenge.imxbt.cn on port 30501: Done[*] Switching to interactive mode$ lsbindevflagliblib64pwn[*] Got EOF while reading in interactive$ 输入一次ls后,就退出程序,此时发现了flag文件,是不是直接cat flag就能获得flag?试一下 $ python3 n...

Read Article

Recent Posts

Writeups and Notes

Archive
2026-04-24

系统调用号

32位#ifndef _ASM_X86_UNISTD_32_H#define _ASM_X86_UNISTD_32_H 1#define NR_restart_syscall 0#define NR_exit 1#define NR_fork 2#define NR_read 3#define NR_write 4#define NR_open 5#define NR_close 6#define NR_waitpid 7#define...

2026-04-23

PolarCTF2026春季赛

one_hundred#导入所需库#--------------------------------------------------------------------------------from pwn import*from LibcSearcher import*from ctypes import*from struct import*import time#设置context#---------------------...

2026-04-22

pwn_小记

本文章会持续更新,用于记录pwn过程中,本人觉得值得记录的东西0v0 pwn的exp简化模板该部分记录使用lambda表达式与自定义函数简化exp,便于未来exp的编写。 #导入所需库#--------------------------------------------------------------------------------from pwn import*from LibcSearcher import*from c...