Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- login function from pwnable.kr > level: passcode
- 0x08048564 <+0>: push %ebp
- 0x08048565 <+1>: mov %esp,%ebp
- 0x08048567 <+3>: sub $0x28,%esp
- => 0x0804856a <+6>: mov $0x8048770,%eax
- 0x0804856f <+11>: mov %eax,(%esp)
- 0x08048572 <+14>: call 0x8048420 <printf@plt>
- 0x08048577 <+19>: mov $0x8048783,%eax
- 0x0804857c <+24>: mov -0x10(%ebp),%edx
- 0x0804857f <+27>: mov %edx,0x4(%esp)
- 0x08048583 <+31>: mov %eax,(%esp)
- 0x08048586 <+34>: call 0x80484a0 <__isoc99_scanf@plt>
- 0x0804858b <+39>: mov 0x804a02c,%eax
- 0x08048590 <+44>: mov %eax,(%esp)
- 0x08048593 <+47>: call 0x8048430 <fflush@plt>
- 0x08048598 <+52>: mov $0x8048786,%eax
- 0x0804859d <+57>: mov %eax,(%esp)
- 0x080485a0 <+60>: call 0x8048420 <printf@plt>
- 0x080485a5 <+65>: mov $0x8048783,%eax
- 0x080485aa <+70>: mov -0xc(%ebp),%edx
- 0x080485ad <+73>: mov %edx,0x4(%esp)
- 0x080485b1 <+77>: mov %eax,(%esp)
- 0x080485b4 <+80>: call 0x80484a0 <__isoc99_scanf@plt>
- 0x080485b9 <+85>: movl $0x8048799,(%esp)
- 0x080485c0 <+92>: call 0x8048450 <puts@plt>
- 0x080485c5 <+97>: cmpl $0x528e6,-0x10(%ebp)
- 0x080485cc <+104>: jne 0x80485f1 <login+141>
- 0x080485ce <+106>: cmpl $0xcc07c9,-0xc(%ebp)
- 0x080485d5 <+113>: jne 0x80485f1 <login+141>
- 0x080485d7 <+115>: movl $0x80487a5,(%esp)
- 0x080485de <+122>: call 0x8048450 <puts@plt>
- 0x080485e3 <+127>: movl $0x80487af,(%esp)
- 0x080485ea <+134>: call 0x8048460 <system@plt>
- 0x080485ef <+139>: leave
- 0x080485f0 <+140>: ret
- 0x080485f1 <+141>: movl $0x80487bd,(%esp)
- 0x080485f8 <+148>: call 0x8048450 <puts@plt>
- 0x080485fd <+153>: movl $0x0,(%esp)
- 0x08048604 <+160>: call 0x8048480 <exit@plt>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement