Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- objdump OF KERNEL EXECUTABLE:
- Contents of section .rodata:
- [0x101000] bee2ffff 08e3ffff 08e3ffff 08e3ffff ................
- [0x101010] 08e3ffff 08e3ffff 08e3ffff 08e3ffff ................
- [0x101020] 08e3ffff 08e3ffff 08e3ffff 00e2ffff ................
- [0x101030] 74e2ffff 08e3ffff 08e3ffff 08e3ffff t...............
- [0x101040] 08e3ffff 74e2ffff 08e3ffff 08e3ffff ....t...........
- [0x101050] 08e3ffff 08e3ffff 08e3ffff 08e3ffff ................
- [0x101060] 08e3ffff 08e3ffff 08e3ffff 27e2ffff ............'...
- [0x101070] 08e3ffff 08e3ffff 08e3ffff 08e3ffff ................
- [0x101080] bee2ffff 77727772 77647366 61646661 ....wrwrwdsfadfa <-- THE TEXT INSIDE printf CALL
- [0x101090] 73646672 00 sdfr.
- ===================================
- BELOW IS BOCHS DISASSEMBLY:
- // PUSHES THE ADDRESS OF STRING
- (0) [0x000000000010164b] 0008:000000000010164b (unk. ctxt): push 0x00101084 ; 6884101000
- <bochs:23>
- // CALLS THE printf
- Next at t=19163378
- (0) [0x0000000000101650] 0008:0000000000101650 (unk. ctxt): call .-1208 (0x0010119d) ; e848fbffff
- BOCHS DISASSEMBLY OF THE LOCATION PASSED TO printf:
- <bochs:30> x /10 0x101084
- [bochs]:
- 0x0000000000101084 <bogus+ 0>: 0x0c83c609 0x00000000 0x7d8377eb 0x16750a08
- 0x0000000000101094 <bogus+ 16>: 0x000c83c6 0x8a000000 0x00000d83 0x83884000
- 0x00000000001010a4 <bogus+ 32>: 0x0000000d 0x7d835beb
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement