Guest User

Untitled

a guest
Jun 13th, 2018
92
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.19 KB | None | 0 0
  1. [howard@sterling shellcodes]$ gdb -q ../easy32
  2. Reading symbols from ../easy32...done.
  3. (gdb) disas main
  4. Dump of assembler code for function main:
  5. 0x08048483 <+0>: lea 0x4(%esp),%ecx
  6. 0x08048487 <+4>: and $0xfffffff0,%esp
  7. 0x0804848a <+7>: pushl -0x4(%ecx)
  8. 0x0804848d <+10>: push %ebp
  9. 0x0804848e <+11>: mov %esp,%ebp
  10. 0x08048490 <+13>: push %ecx
  11. 0x08048491 <+14>: sub $0x4,%esp
  12. 0x08048494 <+17>: mov %ecx,%eax
  13. 0x08048496 <+19>: cmpl $0x2,(%eax)
  14. 0x08048499 <+22>: je 0x80484a5 <main+34>
  15. 0x0804849b <+24>: sub $0xc,%esp
  16. 0x0804849e <+27>: push $0x1
  17. 0x080484a0 <+29>: call 0x8048320 <exit@plt>
  18. 0x080484a5 <+34>: mov 0x4(%eax),%eax
  19. 0x080484a8 <+37>: add $0x4,%eax
  20. 0x080484ab <+40>: mov (%eax),%eax
  21. 0x080484ad <+42>: sub $0xc,%esp
  22. 0x080484b0 <+45>: push %eax
  23. 0x080484b1 <+46>: call 0x804844b <vulnerable>
  24. 0x080484b6 <+51>: add $0x10,%esp
  25. 0x080484b9 <+54>: mov $0x0,%eax
  26. 0x080484be <+59>: mov -0x4(%ebp),%ecx
  27. 0x080484c1 <+62>: leave
  28. 0x080484c2 <+63>: lea -0x4(%ecx),%esp
  29. 0x080484c5 <+66>: ret
  30. End of assembler dump.
Add Comment
Please, Sign In to add comment