Advertisement
Guest User

Untitled

a guest
Jun 20th, 2019
70
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.32 KB | None | 0 0
  1. Dump of assembler code for function main:
  2. 0x0804865d <+0>: lea 0x4(%esp),%ecx
  3. 0x08048661 <+4>: and $0xfffffff0,%esp
  4. 0x08048664 <+7>: pushl -0x4(%ecx)
  5. 0x08048667 <+10>: push %ebp
  6. 0x08048668 <+11>: mov %esp,%ebp
  7. 0x0804866a <+13>: push %ecx
  8. 0x0804866b <+14>: sub $0x14,%esp
  9. 0x0804866e <+17>: mov 0x804a03c,%eax
  10. 0x08048673 <+22>: push $0x0
  11. 0x08048675 <+24>: push $0x2
  12. 0x08048677 <+26>: push $0x0
  13. 0x08048679 <+28>: push %eax
  14. 0x0804867a <+29>: call 0x8048490 <setvbuf@plt>
  15. 0x0804867f <+34>: add $0x10,%esp
  16. 0x08048682 <+37>: call 0x8048450 <getegid@plt>
  17. 0x08048687 <+42>: mov %eax,-0xc(%ebp)
  18. 0x0804868a <+45>: sub $0x4,%esp
  19. 0x0804868d <+48>: pushl -0xc(%ebp)
  20. 0x08048690 <+51>: pushl -0xc(%ebp)
  21. 0x08048693 <+54>: pushl -0xc(%ebp)
  22. 0x08048696 <+57>: call 0x80484b0 <setresgid@plt>
  23. 0x0804869b <+62>: add $0x10,%esp
  24. 0x0804869e <+65>: sub $0xc,%esp
  25. 0x080486a1 <+68>: push $0x8048810
  26. 0x080486a6 <+73>: call 0x8048460 <puts@plt>
  27. 0x080486ab <+78>: add $0x10,%esp
  28. 0x080486ae <+81>: call 0x804862f <vuln>
  29. 0x080486b3 <+86>: mov $0x0,%eax
  30. 0x080486b8 <+91>: mov -0x4(%ebp),%ecx
  31. 0x080486bb <+94>: leave
  32. 0x080486bc <+95>: lea -0x4(%ecx),%esp
  33.  
  34. (gdb) c
  35. Continuing.
  36. Please enter your string:
  37.  
  38. Breakpoint 5, 0x080486ab in main ()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement