format2 user@protostar:/opt/protostar/bin$ perl -e 'print "AAAA", "%x_"x4' | ./format2AAAA200_b7fd8420_bffff624_41414141_target is 0 :( (gdb) disas vuln Dump of assembler code for function vuln:0x08048454 :push ebp0x08048455 :mov ebp,esp0x08048457 :sub esp,0x2180x0804845d :mov eax,ds:0x80496d80x08048462 :mov DWORD PTR [esp+0x8],eax//val0x08048466 :mov DWORD PTR [esp+0x4],0x200//0x2000x0804846e :lea eax,.. 더보기 format1 0x080483f4 :push ebp0x080483f5 :mov ebp,esp0x080483f7 :sub esp,0x180x080483fa :mov eax,DWORD PTR [ebp+0x8]0x080483fd :mov DWORD PTR [esp],eax0x08048400 :call 0x8048320 0x08048405 :mov eax,ds:0x80496380x0804840a :test eax,eax0x0804840c :je 0x804841a 0x0804840e :mov DWORD PTR [esp],0x80485000x08048415 :call 0x8048330 0x0804841a :leave 0x0804841b :ret End of assembler dump. 힙 영역에 target이 저장되어있고 이 값.. 더보기 format0 0x080483fa :mov DWORD PTR [ebp-0xc],0x00x08048401 :mov eax,DWORD PTR [ebp+0x8]0x08048404 :mov DWORD PTR [esp+0x4],eax0x08048408 :lea eax,[ebp-0x4c]0x0804840b :mov DWORD PTR [esp],eax0x0804840e :call 0x8048300 0x08048413 :mov eax,DWORD PTR [ebp-0xc]0x08048416 :cmp eax,0xdeadbeef0x0804841b :jne 0x8048429 0x0804841d :mov DWORD PTR [esp],0x80485100x08048424 :call 0x8048330 0x08048429 :leave 0x080484.. 더보기 이전 1 ··· 6 7 8 9 10 11 12 ··· 27 다음