daily pastebin goal
41%
SHARE
TWEET

Untitled

a guest Jun 13th, 2018 63 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. [howard@sterling shellcodes]$ gdb -q ../easy32
  2. Reading symbols from ../easy32...done.
  3. (gdb) disas main
  4. Dump of assembler code for function main:
  5.    0x08048483 <+0>:    lea    0x4(%esp),%ecx
  6.    0x08048487 <+4>:    and    $0xfffffff0,%esp
  7.    0x0804848a <+7>:    pushl  -0x4(%ecx)
  8.    0x0804848d <+10>:    push   %ebp
  9.    0x0804848e <+11>:    mov    %esp,%ebp
  10.    0x08048490 <+13>:    push   %ecx
  11.    0x08048491 <+14>:    sub    $0x4,%esp
  12.    0x08048494 <+17>:    mov    %ecx,%eax
  13.    0x08048496 <+19>:    cmpl   $0x2,(%eax)
  14.    0x08048499 <+22>:    je     0x80484a5 <main+34>
  15.    0x0804849b <+24>:    sub    $0xc,%esp
  16.    0x0804849e <+27>:    push   $0x1
  17.    0x080484a0 <+29>:    call   0x8048320 <exit@plt>
  18.    0x080484a5 <+34>:    mov    0x4(%eax),%eax
  19.    0x080484a8 <+37>:    add    $0x4,%eax
  20.    0x080484ab <+40>:    mov    (%eax),%eax
  21.    0x080484ad <+42>:    sub    $0xc,%esp
  22.    0x080484b0 <+45>:    push   %eax
  23.    0x080484b1 <+46>:    call   0x804844b <vulnerable>
  24.    0x080484b6 <+51>:    add    $0x10,%esp
  25.    0x080484b9 <+54>:    mov    $0x0,%eax
  26.    0x080484be <+59>:    mov    -0x4(%ebp),%ecx
  27.    0x080484c1 <+62>:    leave  
  28.    0x080484c2 <+63>:    lea    -0x4(%ecx),%esp
  29.    0x080484c5 <+66>:    ret    
  30. End of assembler dump.
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top