{"author_name":"ywkw1717","author_url":"https://blog.hatena.ne.jp/ywkw1717/","image_url":null,"blog_url":"https://ywkw1717.hatenablog.com/","blog_title":"yyy","type":"rich","width":"100%","version":"1.0","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fywkw1717.hatenablog.com%2Fentry%2F2019%2F05%2F19%2F170256\" title=\"Harekaze CTF 2019 Baby ROP, Baby ROP 2, scramble - yyy\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_name":"Hatena Blog","published":"2019-05-19 17:02:56","url":"https://ywkw1717.hatenablog.com/entry/2019/05/19/170256","description":"Baby ROP \u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u304c\u3042\u308a\uff0c\u30d0\u30a4\u30ca\u30ea\u5185\u306bsystem\u3082\u7528\u610f\u3055\u308c\u3066\u3044\u305f\u306e\u3067ROP\u3067system\u306b\u98db\u3070\u3059\u3060\u3051\uff0e /bin/sh \u3082\u30d0\u30a4\u30ca\u30ea\u5185\u306b\u3042\u3063\u305f\u306e\u3067\u305d\u308c\u3092\u4f7f\u3063\u305f\uff0e gist.github.com $ python exploit.py [+] Opening connection to problem.harekaze.com on port 20001: Done [*] Switching to interactive mode What's your name? $ ls bin boot dev etc home lib lib64 media mnt opt pr\u2026","provider_url":"https://hatena.blog","height":"190","title":"Harekaze CTF 2019 Baby ROP, Baby ROP 2, scramble","categories":[]}