½Ã½ºÅÛ ÇØÅ·

 1574, 5/79 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   vngkv123
   gdb¿¡¼­...

http://www.hackerschool.org/HS_Boards/zboard.php?desc=asc&no=1848 [º¹»ç]


µð½º¾î¼ÀºíÇϸ鼭 Çѹø¾¿ ÆÄÀÏÁß¿¡ dynamic¸µÅ©ÀÓ¿¡µµ ºÒ±¸ÇÏ°í
¿¹¸¦µé¾î puts@pltÀÌ·±°Ô ±ÛÀÚ°¡ »ç¶óÁøä·Î ÁÖ¼Ò¸¸ ÂïÈ÷´Â°Ç ¾î¶² ¿É¼ÇÀ» ÁØ°Ç°¡¿ä?


  Hit : 2175     Date : 2017/04/05 08:02



    
pwnnnt strip µÈ ÆÄÀÏÀ» ¸»¾¸ÇϽŰǰ¡¿ä ? 2017/04/05  
vngkv123 ¾Æ´¨ strip¾ÈµÈ°Å¿¡¿ä.
0x00004ff7 <+0>: lea ecx,[esp+0x4]
0x00004ffb <+4>: and esp,0xfffffff0
0x00004ffe <+7>: push DWORD PTR [ecx-0x4]
0x00005001 <+10>: push ebp
0x00005002 <+11>: mov ebp,esp
0x00005004 <+13>: push esi
0x00005005 <+14>: push ebx
0x00005006 <+15>: push ecx
0x00005007 <+16>: sub esp,0x1c
0x0000500a <+19>: call 0x610 <__x86.get_pc_thunk.bx>
0x0000500f <+24>: add ebx,0x5fa5
0x00005015 <+30>: mov esi,ecx
0x00005017 <+32>: mov DWORD PTR [ebp-0x1c],0x0
0x0000501e <+39>: mov eax,DWORD PTR [ebx+0x2c]
0x00005024 <+45>: mov eax,DWORD PTR [eax]
0x00005026 <+47>: push 0x0
0x00005028 <+49>: push 0x2
0x0000502a <+51>: push 0x0
0x0000502c <+53>: push eax
0x0000502d <+54>: call 0x5b8
0x00005032 <+59>: add esp,0x10
0x00005035 <+62>: mov eax,DWORD PTR [ebx+0x38]
0x0000503b <+68>: mov eax,DWORD PTR [eax]
0x0000503d <+70>: push 0x0
0x0000503f <+72>: push 0x2
0x00005041 <+74>: push 0x0
0x00005043 <+76>: push eax
0x00005044 <+77>: call 0x5b8
0x00005049 <+82>: add esp,0x10
0x0000504c <+85>: cmp DWORD PTR [esi],0x1
0x0000504f <+88>: je 0x50a3 <main+172>
0x00005051 <+90>: sub esp,0xc
0x00005054 <+93>: push 0x0
0x00005056 <+95>: call 0x5a0
0x0000505b <+100>: mov eax,DWORD PTR [ebp-0x1c]
0x0000505e <+103>: lea edx,[eax*4+0x0]
0x00005065 <+110>: mov eax,DWORD PTR [esi+0x4]
0x00005068 <+113>: add eax,edx
0x0000506a <+115>: mov eax,DWORD PTR [eax]
0x0000506c <+117>: sub esp,0xc
0x0000506f <+120>: push eax
0x00005070 <+121>: call 0x5a8
0x00005075 <+126>: add esp,0x10
0x00005078 <+129>: mov edx,eax
0x0000507a <+131>: mov eax,DWORD PTR [ebp-0x1c]
0x0000507d <+134>: lea ecx,[eax*4+0x0]
0x00005084 <+141>: mov eax,DWORD PTR [esi+0x4]
0x00005087 <+144>: add eax,ecx
0x00005089 <+146>: mov eax,DWORD PTR [eax]
0x0000508b <+148>: sub esp,0x4
0x0000508e <+151>: push edx
0x0000508f <+152>: push 0x0
0x00005091 <+154>: push eax
0x00005092 <+155>: call 0x5c0


ÀÌ·±½ÄÀ¸·Î ³ª¿À´Âµ¥ PIE¶û FULL RELRO°¡ °É¸°»óÅÂÀÔ´Ï´Ù
2017/04/05  
1494   FTZ - Level12..[1]     ys200209
07/19 2116
1493   BOF ÇÚµåºÏ ½Ã½ºÅÛ ÇØÅ· ¸¶Áö¸·¹®Á¦ Áú¹®ÀÔ´Ï´Ù[1]     deccj97
11/28 2118
1492   RTLÁú¹®![1]     Sp4wn
10/20 2130
1491   ROP Áú¹®ÀÔ´Ï´Ù[2]     turttle2s
09/09 2134
1490   c¾ð¾î ÇÔ¼ö Á¤ÀÇÁß¿¡...     vngkv123
06/20 2139
1489   rop gadgetãÀ» ¶§....[1]     vngkv123
03/30 2141
1488   ptraceÇÔ¼ö¸¦ ÅëÇØ µð¹ö°Å¸¦ ±¸ÇöÇϴµ¥...     vngkv123
09/25 2142
1487   gdb ºÐ¼® disas[5]     ewqqw
04/16 2153
1486   ¹öÆÛ ¿À¹öÇÃ·Î¿ì °ü·Ã[2]     ewqqw
04/20 2159
1485   hex ray Áú¹®[2]     wwwlk
07/16 2165
1484   ret2kernel32? (À©µµ¿ì ret2libc)[3]     choboKing
06/11 2169
1483 ºñ¹Ð±ÛÀÔ´Ï´Ù  destruction[17]     sweetick
06/25 2171
  gdb¿¡¼­...[2]     vngkv123
04/05 2174
1481   ½Ã½ºÅÛÇØÅ·ÇÒ¶§ [3]     thsrhkdwns
12/05 2187
1480   shellcode Áú¹®µå¸³´Ï´Ù.[1]     bong93
01/07 2218
1479   ¹öÆÛ¿À¹öÇÃ·Î¿ì °ü·Ã[1]     ewqqw
04/21 2224
1478   ITºÐ¾ß·Î Áø·Î°í¹ÎÀ̳ª,Ãë¾÷,ÀÌÁ÷°í¹ÎÀ¸·Î ±Ã±ÝÇÑÁ¡µéÀÌ ¸¹À¸½ÃÁÒ~?     koreais0
08/08 2233
1477   heap exploit ±â¹ý °øºÎ ¹æ¹ý....     choboKing
08/09 2241
1476   °í¼ö´Ôµé²² Áú¹®ÇÕ´Ï´Ù.[2]     pwnnnt
03/30 2242
1475   unlink¸ÅÅ©·Î¿¡¼­ P....[5]     vngkv123
05/12 2259
[1][2][3][4] 5 [6][7][8][9][10]..[79]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org