net3 #include "../common/common.c" #define NAME "net3"#define UID 996#define GID 996#define PORT 2996 /** Extract a null terminated string from the buffer */ int get_string(char **result, unsigned char *buffer, u_int16_t len){unsigned char byte; byte = *buffer; if(byte > len) errx(1, "badly formed packet");*result = malloc(byte);strcpy(*result, buffer + 1); return byte + 1;} /** Check to see if we ca.. 더보기 net2 (gdb) disas runDump of assembler code for function run:0x0804978a :push ebp0x0804978b :mov ebp,esp0x0804978d :push ebx0x0804978e :sub esp,0x340x08049791 :mov DWORD PTR [ebp-0xc],0x0//val1(ebp-0xc) = 00x08049798 :mov DWORD PTR [ebp-0x10],0x0//val2(ebp-0x10) = 00x0804979f :jmp 0x80497fb 0x080497a1 :mov ebx,DWORD PTR [ebp-0x10]//edx = val20x080497a4 :call 0x8048a98 0x080497a9 :mov DWORD PTR [ebp+eb.. 더보기 net1 C:\Users\user>E:\pwnable\protostar\net1.py쿸? ?장난삼아돌려봤는데 음 코드분석 귀찮다 (gdb) disas runDump of assembler code for function run:0x0804981a :push ebp0x0804981b :mov ebp,esp0x0804981d :sub esp,0x380x08049820 :call 0x8048b10 //이번에도 랜덤 0x08049825 :mov DWORD PTR [ebp-0x28],eax0x08049828 :mov edx,DWORD PTR [ebp-0x28] //랜덤값은 edx에0x0804982b :mov eax,0x8049d54//%d0x08049830 :mov DWORD PTR [esp+0x8],edx0x080498.. 더보기 이전 1 ··· 4 5 6 7 8 9 10 ··· 27 다음