hacktricks/reversing-and-exploiting/linux-exploiting-basic-esp/arbitrary-write-2-exec
2024-07-18 22:08:20 +00:00
..
aw2exec-__malloc_hook.md Translated ['binary-exploitation/basic-stack-binary-exploitation-methodo 2024-07-18 22:08:20 +00:00
aw2exec-got-plt.md Translated ['binary-exploitation/basic-stack-binary-exploitation-methodo 2024-07-18 22:08:20 +00:00
aws2exec-.dtors-and-.fini_array.md Translated ['binary-exploitation/basic-stack-binary-exploitation-methodo 2024-07-18 22:08:20 +00:00
README.md Translated ['README.md', 'backdoors/salseo.md', 'cryptography/certificat 2024-03-29 21:06:45 +00:00

任意写入转为执行

In this challenge, you will exploit a binary to execute the system function by overwriting a function pointer with the address of system.

在这个挑战中,您将利用一个二进制文件,通过覆盖一个函数指针的地址为system函数的地址来执行system函数。