| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | |
| 7 | 8 | 9 | 10 | 11 | 12 | 13 |
| 14 | 15 | 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 | 26 | 27 |
| 28 | 29 | 30 | 31 |
- Reverse
- reversing
- writeup
- rev
- Toddler's Bottle
- Read
- pwnable.kr
- FSB
- CANARY
- 2018
- pwnable
- format
- shellcode
- Leak
- practicalmalwareanalysis
- Rookiss
- ASM
- string
- anti
- BOF
- shellcraft
- pwn
- Bottle
- CTF
- pico
- picoCTF
- Bug
- TUCTF
- PMA
- toddler
- Today
- Total
목록ASM (6)
제리의 블로그
div 명령어를 수행하는데 20 클럭 이상이 들어간다더라.https://stackoverflow.com/questions/4361979/how-does-the-gcc-implementation-of-modulo-work-and-why-does-it-not-use-the#answer-4362081
Description What does asm3(0xb3fb1998,0xfe1a474d,0xd5373fd4) return? Submit the flag as a hexadecimal value (starting with '0x'). NOTE: Your submission for this question will NOT be in the normal flag format. Source located in the directory at /problems/assembly-3_0_64e940c92852f106e798ceac9b22aa25. end_asm_rev.S: .intel_syntax noprefix .bits 32 .global asm3 asm3: push ebp mov ebp,esp mov eax,0x..
asm - 6 pt Mommy! I think I know how to make shellcodes ssh asm@pwnable.kr -p2222 (pw: guest)쉘코드를 만드는 문제인가 봅니다.일단 ssh 접속해볼까요? asm@ubuntu:~$ ls -l total 28 -rwxr-xr-x 1 root root 13704 Nov 29 2016 asm -rw-r--r-- 1 root root 1793 Nov 29 2016 asm.c -rw-r--r-- 1 root root 211 Nov 19 2016 readme -rw-r--r-- 1 root root 67 Nov 19 2016 this_is_pwnable.kr_flag_file_please_read_this_file.sorry_the_file_na..
보호되어 있는 글입니다.
#asm, #bof, #shellcodeOnline Banking90 points Binary Exploitation - Unsolved (100 solves)Written by nthistle Try out our new online banking service! nc problem1.tjctf.org 8005 Binary Source 취약점 발견 7 int verify_pin(char* pin) { 8 char pin_check[PIN_SIZE+1]; 9 printf("Please verify your PIN first:\nPIN: "); 10 fgets(pin_check, NAME_SIZE+1, stdin); 11 for(int i = 0; i < 4; i ++) { 12 if(pin[i] != p..
DescriptionHow much can a couple bytes do?Use shells! Source. Connect on shell2017.picoctf.com:50454. Analysisint vuln() { void *buf; // [sp+Ch] [bp-Ch]@1 buf = mmap(0, 0xAu, 7, 34, 0, 0); if ( buf == (void *)-1 ) { puts("Failed to get space. Please talk to admin"); exit(0); } printf("Give me %d bytes:\n", 10); fflush(stdout); if ( !read(0, buf, 0xAu) ) { printf("You didn't give me anything :(")..