Pwntoolscông việc
The report should contain: 1. a short description of the vulnerability, 2. a Python script showing the exploit using pwntools, 3. a description of how the exploit works, and 4. the string found in flag.txt.
Return-oriented programming (ROP) is one of the more advanced techniques used in the realm of exploitation. In order to bypass non-executable memory locations, ROP uses small bits of code that already exist in the binary, chains them together with careful use of the RET instruction, and produces a chain that can execute nearly any arbitrary code. In this Project, you'll be tasked with chainin...