能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
[原创]VM逆向,一篇就够了(上)
学习班
楼主,实战1和实战2的文件能不能提供下,谢谢。
GWCTFbabyvm可以从buu: 8c5K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1N6i4g2G2K9W2)9J5k6h3y4F1i4K6u0r3j5$3S2S2L8r3I4W2L8X3N6W2M7#2)9J5y4X3&6T1M7%4m8Q4x3@1t1`.hgame vm在NSS: bf5K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2F1M7%4y4U0N6r3k6Q4x3X3g2U0L8W2)9J5c8X3W2F1k6r3g2^5i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.
|
能力值:
( LV6,RANK:80 )
|
-
-
[求助]app检测自身是否运行在docker容器中
pureGavin
内核中的进程描述符里有个nsproxy结构体,这个指明了你是否在docker中,当然,如果你直接修改这个结构体,也能做到docker逃逸
大佬 这个怎么能看出来 generic_x86_64_arm64:/ # ls -l /proc/self/ns total 0 lrwxrwxrwx 1 root root 0 2024-09-14 03:03 cgroup -> cgroup:[4026531835] lrwxrwxrwx 1 root root 0 2024-09-14 03:03 mnt -> mnt:[4026532600] lrwxrwxrwx 1 root root 0 2024-09-14 03:03 net -> net:[4026531998] lrwxrwxrwx 1 root root 0 2024-09-14 03:03 uts -> uts:[4026531838] generic_x86_64_arm64:/ # ls -l /proc/5110/ns total 0 lrwxrwxrwx 1 u0_a167 u0_a167 0 2024-09-14 03:03 cgroup -> cgroup:[4026531835] lrwxrwxrwx 1 u0_a167 u0_a167 0 2024-09-14 03:03 mnt -> mnt:[4026532813] lrwxrwxrwx 1 u0_a167 u0_a167 0 2024-09-14 03:03 net -> net:[4026531998] lrwxrwxrwx 1 u0_a167 u0_a167 0 2024-09-14 03:03 uts -> uts:[4026531838]
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
|
能力值:
( LV6,RANK:80 )
|
-
-
[原创]VM逆向,一篇就够了(上)
dangluan
请附上练习exe文件 [em_67], 感谢
GWCTFbabyvm可以从buu: 00fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1N6i4g2G2K9W2)9J5k6h3y4F1i4K6u0r3j5$3S2S2L8r3I4W2L8X3N6W2M7#2)9J5y4X3&6T1M7%4m8Q4x3@1t1`.hgame vm在NSS: bfaK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2F1M7%4y4U0N6r3k6Q4x3X3g2U0L8W2)9J5c8X3W2F1k6r3g2^5i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.
|