½Ã½ºÅÛ ÇØÅ·

 1574, 1/79 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   vngkv123
   gdb¿¡¼­...

http://www.hackerschool.org/HS_Boards/zboard.php?id=QNA_system&no=1848 [º¹»ç]


µð½º¾î¼ÀºíÇϸ鼭 Çѹø¾¿ ÆÄÀÏÁß¿¡ dynamic¸µÅ©ÀÓ¿¡µµ ºÒ±¸ÇÏ°í
¿¹¸¦µé¾î puts@pltÀÌ·±°Ô ±ÛÀÚ°¡ »ç¶óÁøä·Î ÁÖ¼Ò¸¸ ÂïÈ÷´Â°Ç ¾î¶² ¿É¼ÇÀ» ÁØ°Ç°¡¿ä?


  Hit : 2159     Date : 2017/04/05 08:02



    
pwnnnt strip µÈ ÆÄÀÏÀ» ¸»¾¸ÇϽŰǰ¡¿ä ? 2017/04/05  
vngkv123 ¾Æ´¨ strip¾ÈµÈ°Å¿¡¿ä.
0x00004ff7 <+0>: lea ecx,[esp+0x4]
0x00004ffb <+4>: and esp,0xfffffff0
0x00004ffe <+7>: push DWORD PTR [ecx-0x4]
0x00005001 <+10>: push ebp
0x00005002 <+11>: mov ebp,esp
0x00005004 <+13>: push esi
0x00005005 <+14>: push ebx
0x00005006 <+15>: push ecx
0x00005007 <+16>: sub esp,0x1c
0x0000500a <+19>: call 0x610 <__x86.get_pc_thunk.bx>
0x0000500f <+24>: add ebx,0x5fa5
0x00005015 <+30>: mov esi,ecx
0x00005017 <+32>: mov DWORD PTR [ebp-0x1c],0x0
0x0000501e <+39>: mov eax,DWORD PTR [ebx+0x2c]
0x00005024 <+45>: mov eax,DWORD PTR [eax]
0x00005026 <+47>: push 0x0
0x00005028 <+49>: push 0x2
0x0000502a <+51>: push 0x0
0x0000502c <+53>: push eax
0x0000502d <+54>: call 0x5b8
0x00005032 <+59>: add esp,0x10
0x00005035 <+62>: mov eax,DWORD PTR [ebx+0x38]
0x0000503b <+68>: mov eax,DWORD PTR [eax]
0x0000503d <+70>: push 0x0
0x0000503f <+72>: push 0x2
0x00005041 <+74>: push 0x0
0x00005043 <+76>: push eax
0x00005044 <+77>: call 0x5b8
0x00005049 <+82>: add esp,0x10
0x0000504c <+85>: cmp DWORD PTR [esi],0x1
0x0000504f <+88>: je 0x50a3 <main+172>
0x00005051 <+90>: sub esp,0xc
0x00005054 <+93>: push 0x0
0x00005056 <+95>: call 0x5a0
0x0000505b <+100>: mov eax,DWORD PTR [ebp-0x1c]
0x0000505e <+103>: lea edx,[eax*4+0x0]
0x00005065 <+110>: mov eax,DWORD PTR [esi+0x4]
0x00005068 <+113>: add eax,edx
0x0000506a <+115>: mov eax,DWORD PTR [eax]
0x0000506c <+117>: sub esp,0xc
0x0000506f <+120>: push eax
0x00005070 <+121>: call 0x5a8
0x00005075 <+126>: add esp,0x10
0x00005078 <+129>: mov edx,eax
0x0000507a <+131>: mov eax,DWORD PTR [ebp-0x1c]
0x0000507d <+134>: lea ecx,[eax*4+0x0]
0x00005084 <+141>: mov eax,DWORD PTR [esi+0x4]
0x00005087 <+144>: add eax,ecx
0x00005089 <+146>: mov eax,DWORD PTR [eax]
0x0000508b <+148>: sub esp,0x4
0x0000508e <+151>: push edx
0x0000508f <+152>: push 0x0
0x00005091 <+154>: push eax
0x00005092 <+155>: call 0x5c0


ÀÌ·±½ÄÀ¸·Î ³ª¿À´Âµ¥ PIE¶û FULL RELRO°¡ °É¸°»óÅÂÀÔ´Ï´Ù
2017/04/05  
1574   pwnable.kr echo1 Áú¹®2 (½ºÆ÷ ÁÖÀÇ)[2]     turttle2s
10/05 1212
1573   LOB GATE¹®Á¦ Ç®¸é¼­ ±Ã±ÝÇÑÁ¡[3]     hackxx123
08/24 865
1572   libc°ü·Ã - 2[5]     lMaxl04
08/24 859
1571   ASLRÀÌ °É·ÁÀÖÀ»¶§ ret¿¡ ROPÀ¸·Î jmp %espÀ» »ç¿ëÇÑ °æ¿ì.[3]     lMaxl04
06/29 1116
1570   ¸®¸ðÆ® ȯ°æ¿¡¼­ÀÇ ½ºÅà ÁÖ¼Ò È®ÀÎ ¹æ¹ýÀÌ ±Ã±ÝÇÕ´Ï´Ù.[2]     lMaxl04
06/16 918
1569   ÇØÅ· ÇÁ¸®¼­¹ö ¾ø¾îÁ³³ª¿ä?[1]     terfkim
04/15 1698
1568   ½ºÅÿ¡ µ¥ÀÌÅÍ ³ÖÀ» ¶§ SIGSEGV[4]     turttle2s
02/04 1429
1567   pwnable.kr echo1 Áú¹®[2]     turttle2s
06/17 1707
1566   ROP strcpy °ü·Ã Áú¹®ÀÔ´Ï´Ù.[3]     heeyoung0511
06/16 1554
1565   Level2 -> Level3 ¿¡¼­ vi¿Í /usr/bin/EditorÀÇ Â÷ÀÌ[2]     hyemin1826
07/18 1785
1564   Trainer3 ftz.hackerschool.org È£½ºÆ® Á¢¼Ó ºÒ°¡[1]     hyemin1826
07/18 3194
1563   dllÀÎÁ§¼Ç ½ÇÇèÁß Áú¹® µå¸³´Ï´Ù.[1]     kkk477
05/31 1825
1562   ÆÐŶ º¹È£È­¸¦ ¸¶½ºÅÍ ÇÏ·Á¸é ¾î¶² °úÁ¤ÀÌ ÀÖ¾î¾ßÇϳª¿ä?     sa0814
04/01 1671
1561   »ç±â[2]     jas08
03/31 1961
1560   ½Ã½ºÅÛ ÄÝÀÌ °¡´ÉÇÑ ¸Þ¸ð¸® ¿µ¿ª°ú ºÒ°¡´ÉÇÑ ¸Þ¸ð¸® ¿µ¿ªÀÌ Á¸ÀçÇϳª¿ä?     ocal
03/30 1712
1559   pwntools »ç¿ë½Ã¿Í ±âº» socket ¸ðµâ ÀÌ¿ë½Ã Â÷ÀÌ?[4]     ocal
01/09 2249
1558   lob level19(nightmare) °ü·ÃÁú¹®[1]     dnjsdnwja
12/18 1723
1557   ftz level2 Áú¹®ÀÖ½À´Ï´Ù[1]     kihyun1998
12/13 1813
1556   ftz level2¹ø Ǫ´Âµ¥¿ä ±ÇÇÑÀÌ...     kihyun1998
12/06 1688
1555   ½Ã½ºÅÛÇØÅ·ÇÒ¶§ [3]     thsrhkdwns
12/05 2168
1 [2][3][4][5][6][7][8][9][10]..[79]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org