½Ã½ºÅÛ ÇØÅ·

 1574, 7/79 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   vngkv123
   gdb¿¡¼­...

http://www.hackerschool.org/HS_Boards/zboard.php?id=QNA_system&no=1848 [º¹»ç]


µð½º¾î¼ÀºíÇϸ鼭 Çѹø¾¿ ÆÄÀÏÁß¿¡ dynamic¸µÅ©ÀÓ¿¡µµ ºÒ±¸ÇÏ°í
¿¹¸¦µé¾î puts@pltÀÌ·±°Ô ±ÛÀÚ°¡ »ç¶óÁøä·Î ÁÖ¼Ò¸¸ ÂïÈ÷´Â°Ç ¾î¶² ¿É¼ÇÀ» ÁØ°Ç°¡¿ä?


  Hit : 2141     Date : 2017/04/05 08:02



    
pwnnnt strip µÈ ÆÄÀÏÀ» ¸»¾¸ÇϽŰǰ¡¿ä ? 2017/04/05  
vngkv123 ¾Æ´¨ strip¾ÈµÈ°Å¿¡¿ä.
0x00004ff7 <+0>: lea ecx,[esp+0x4]
0x00004ffb <+4>: and esp,0xfffffff0
0x00004ffe <+7>: push DWORD PTR [ecx-0x4]
0x00005001 <+10>: push ebp
0x00005002 <+11>: mov ebp,esp
0x00005004 <+13>: push esi
0x00005005 <+14>: push ebx
0x00005006 <+15>: push ecx
0x00005007 <+16>: sub esp,0x1c
0x0000500a <+19>: call 0x610 <__x86.get_pc_thunk.bx>
0x0000500f <+24>: add ebx,0x5fa5
0x00005015 <+30>: mov esi,ecx
0x00005017 <+32>: mov DWORD PTR [ebp-0x1c],0x0
0x0000501e <+39>: mov eax,DWORD PTR [ebx+0x2c]
0x00005024 <+45>: mov eax,DWORD PTR [eax]
0x00005026 <+47>: push 0x0
0x00005028 <+49>: push 0x2
0x0000502a <+51>: push 0x0
0x0000502c <+53>: push eax
0x0000502d <+54>: call 0x5b8
0x00005032 <+59>: add esp,0x10
0x00005035 <+62>: mov eax,DWORD PTR [ebx+0x38]
0x0000503b <+68>: mov eax,DWORD PTR [eax]
0x0000503d <+70>: push 0x0
0x0000503f <+72>: push 0x2
0x00005041 <+74>: push 0x0
0x00005043 <+76>: push eax
0x00005044 <+77>: call 0x5b8
0x00005049 <+82>: add esp,0x10
0x0000504c <+85>: cmp DWORD PTR [esi],0x1
0x0000504f <+88>: je 0x50a3 <main+172>
0x00005051 <+90>: sub esp,0xc
0x00005054 <+93>: push 0x0
0x00005056 <+95>: call 0x5a0
0x0000505b <+100>: mov eax,DWORD PTR [ebp-0x1c]
0x0000505e <+103>: lea edx,[eax*4+0x0]
0x00005065 <+110>: mov eax,DWORD PTR [esi+0x4]
0x00005068 <+113>: add eax,edx
0x0000506a <+115>: mov eax,DWORD PTR [eax]
0x0000506c <+117>: sub esp,0xc
0x0000506f <+120>: push eax
0x00005070 <+121>: call 0x5a8
0x00005075 <+126>: add esp,0x10
0x00005078 <+129>: mov edx,eax
0x0000507a <+131>: mov eax,DWORD PTR [ebp-0x1c]
0x0000507d <+134>: lea ecx,[eax*4+0x0]
0x00005084 <+141>: mov eax,DWORD PTR [esi+0x4]
0x00005087 <+144>: add eax,ecx
0x00005089 <+146>: mov eax,DWORD PTR [eax]
0x0000508b <+148>: sub esp,0x4
0x0000508e <+151>: push edx
0x0000508f <+152>: push 0x0
0x00005091 <+154>: push eax
0x00005092 <+155>: call 0x5c0


ÀÌ·±½ÄÀ¸·Î ³ª¿À´Âµ¥ PIE¶û FULL RELRO°¡ °É¸°»óÅÂÀÔ´Ï´Ù
2017/04/05  
1454   ¹öÆÛ¿À¹öÇÃ·Î¿ì °ü·Ã Áú¹®..[1]     ewqqw
04/17 2320
1453   ubuntu 16.04 UAF¹ö±×..[10]     vngkv123
04/16 3096
1452   gdb ºÐ¼® disas[5]     ewqqw
04/16 2122
1451   pwntools ¸¦ ÀÌ¿ëÇÑ Àͽº Áú¹®[6]     tkakr7458
04/16 7234
1450   ¹öÆÛ¿À¹öÇ÷οì Áú¹®....[2]     ewqqw
04/16 2272
1449   IDA¿¡¼­ ¼Ò½ºÄڵ带 º¹¿øÇßÀ»¶§[5]     vngkv123
04/13 3516
1448   aslr ȯ°æ¿¡¼­...[2]     vngkv123
04/12 2518
1447   asis CTF ¹®Á¦Ç®´Ù°¡....[4]     vngkv123
04/12 2233
1446   pwnable kr OTP¹®Á¦...[2]     vngkv123
04/09 2755
1445   64bit elfÆÄÀÏ µð¹ö±ë½Ã[6]     vngkv123
04/08 2485
  gdb¿¡¼­...[2]     vngkv123
04/05 2140
1443   ¹®Á¦ ¹æÇ⼺...[11]     vngkv123
04/04 2405
1442   2013 plaid ctf rop ..[14]     vngkv123
04/02 2454
1441   python Æä1À̷εå ÀÛ¼º½Ã[1]     vngkv123
04/02 1895
1440   ¿ë¾îµé Áú¹®..[6]     vngkv123
04/01 2339
1439   strippedµÈ ¹ÙÀ̳ʸ®ÆÄÀÏÀ» µð¹ö±ëÇÒ¶§...[5]     vngkv123
04/01 2511
1438   fc10 fc14...[1]     vngkv123
04/01 2043
1437   gdb¿¡¼­ callÀÌÈÄ ºê·¹ÀÌÅ©¸¦ °É¾úÀ»¶§..[10]     vngkv123
03/31 2003
1436   ¸®ÅÏ°ú °ü·ÃÇÑ Áú¹®....[9]     vngkv123
03/30 1939
1435   rop gadgetãÀ» ¶§....[1]     vngkv123
03/30 2111
[1][2][3][4][5][6] 7 [8][9][10]..[79]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org