
fd
·
Wargame/pwnable.kr
1. intro 2. code 및 분석 2.1. code #include #include #include char buf[32]; int main(int argc, char* argv[], char* envp[]){ if(argc python3 a.py [+] Connecting to pwnable.kr on port 2222: Done [*] fd@pwnable.kr: Distro Ubuntu 16.04 OS: linux Arch: amd64 Version: 4.4.179 ASLR: Enabled [+] Starting remote process bytearray(b'./fd') on pwnable.kr: pid 406811 good job :) ----------#플래그는 삭제