일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 |
- pico
- pwnable.kr
- rev
- ASM
- shellcode
- TUCTF
- anti
- toddler
- Leak
- shellcraft
- BOF
- string
- writeup
- practicalmalwareanalysis
- FSB
- CANARY
- CTF
- pwn
- pwnable
- Rookiss
- reversing
- 2018
- PMA
- Reverse
- Bottle
- Bug
- picoCTF
- Read
- Toddler's Bottle
- format
- Today
- Total
목록ASM (6)
제리의 블로그
div 명령어를 수행하는데 20 클럭 이상이 들어간다더라.https://stackoverflow.com/questions/4361979/how-does-the-gcc-implementation-of-modulo-work-and-why-does-it-not-use-the#answer-4362081
Description What does asm3(0xb3fb1998,0xfe1a474d,0xd5373fd4) return? Submit the flag as a hexadecimal value (starting with '0x'). NOTE: Your submission for this question will NOT be in the normal flag format. Source located in the directory at /problems/assembly-3_0_64e940c92852f106e798ceac9b22aa25. end_asm_rev.S: .intel_syntax noprefix .bits 32 .global asm3 asm3: push ebp mov ebp,esp mov eax,0x..
asm - 6 pt Mommy! I think I know how to make shellcodes ssh asm@pwnable.kr -p2222 (pw: guest)쉘코드를 만드는 문제인가 봅니다.일단 ssh 접속해볼까요? asm@ubuntu:~$ ls -l total 28 -rwxr-xr-x 1 root root 13704 Nov 29 2016 asm -rw-r--r-- 1 root root 1793 Nov 29 2016 asm.c -rw-r--r-- 1 root root 211 Nov 19 2016 readme -rw-r--r-- 1 root root 67 Nov 19 2016 this_is_pwnable.kr_flag_file_please_read_this_file.sorry_the_file_na..
보호되어 있는 글입니다.
#asm, #bof, #shellcodeOnline Banking90 points Binary Exploitation - Unsolved (100 solves)Written by nthistle Try out our new online banking service! nc problem1.tjctf.org 8005 Binary Source 취약점 발견 7 int verify_pin(char* pin) { 8 char pin_check[PIN_SIZE+1]; 9 printf("Please verify your PIN first:\nPIN: "); 10 fgets(pin_check, NAME_SIZE+1, stdin); 11 for(int i = 0; i < 4; i ++) { 12 if(pin[i] != p..
DescriptionHow much can a couple bytes do?Use shells! Source. Connect on shell2017.picoctf.com:50454. Analysisint vuln() { void *buf; // [sp+Ch] [bp-Ch]@1 buf = mmap(0, 0xAu, 7, 34, 0, 0); if ( buf == (void *)-1 ) { puts("Failed to get space. Please talk to admin"); exit(0); } printf("Give me %d bytes:\n", 10); fflush(stdout); if ( !read(0, buf, 0xAu) ) { printf("You didn't give me anything :(")..