Advertisement
Guest User

stack-five exploit education

a guest
Oct 23rd, 2019
144
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.75 KB | None | 0 0
  1. Step 1. gdb stack-five
  2. Step 2. disass main
  3. output:
  4. Dump of assembler code for function main:
  5. 0x000000000000114c <+0>: push %rbp
  6. 0x000000000000114d <+1>: mov %rsp,%rbp
  7. 0x0000000000001150 <+4>: sub $0x10,%rsp
  8. 0x0000000000001154 <+8>: mov %edi,-0x4(%rbp)
  9. 0x0000000000001157 <+11>: mov %rsi,-0x10(%rbp)
  10. 0x000000000000115b <+15>: mov $0x0,%eax
  11. 0x0000000000001160 <+20>: callq 0x1135 <start_level>
  12. 0x0000000000001165 <+25>: mov $0x0,%eax
  13. 0x000000000000116a <+30>: leaveq
  14. 0x000000000000116b <+31>: retq
  15. Step 3. break *0x116b
  16. output:
  17. Breakpoint 1 at 0x116b: line 23.
  18. Step 4. run
  19. output:
  20. Starting program: /opt/phoenix/amd64/stack-five
  21.  
  22. [1]+ Stopped gdb stack-five
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement