일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 |
- cryptography
- CTF
- 워게임
- ctf player
- deayzl
- 2022 Fall GoN Open Qual CTF
- writeup
- KAIST
- reversing
- 웹해킹
- crypto
- webhacking.kr
- pwnable
- got overwrite
- 해킹
- hacking game
- christmas ctf
- Gon
- h4cking game
- System Hacking
- webhacking
- TeamH4C
- Wreckctf
- hacking
- python
- Wargame
- WEB
- Buffer Overflow
- dreamhack
- hack
- Today
- Total
목록ghidra (2)
deayzl's blog
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/cJEsdC/btsdelEIaQG/krQBC633w2iXuKEMXsEKV0/img.png)
Tool: ghidra 10.2.2 with GolangAnalyzerExtension Exploit: making utf-8 shellcode (pwnable) feat. I've never written any code in go language, so all of these are from internet references and quite a lot of my predictions. So there might be something wrong with my analysis. /* WARNING: Unknown calling convention */ /* Name: main.handleConnection Start: 004cd140 End: 004cdb00 */ void main.handleCon..
![](http://i1.daumcdn.net/thumb/C150x150/?fname=https://blog.kakaocdn.net/dn/v2May/btrKUcPZKMK/GBuAuyd4YOquUIGWHUfGIk/img.png)
undefined8 main(int param_1,undefined8 *param_2) { undefined8 uVar1; long in_FS_OFFSET; long canary; canary = *(long *)(in_FS_OFFSET + 0x28); if (param_1 == 1) { stdinaddr = stdin; } else { if (param_1 != 2) { printf("Usage: %s []\n",*param_2); /* WARNING: Subroutine does not return */ exit(8); } stdinaddr = fopen((char *)param_2[1],"r"); if (stdinaddr == (FILE *)0x0) { printf("%s: Error: Couldn..