티스토리 뷰

level1@io:/levels$ gdb -q level01

Reading symbols from /levels/level01...(no debugging symbols found)...done.

(gdb) disas main

Dump of assembler code for function main:

   0x08048080 <+0>: push   $0x8049128

   0x08048085 <+5>: call   0x804810f <puts>

   0x0804808a <+10>: call   0x804809f <fscanf>

   0x0804808f <+15>: cmp    $0x10f,%eax

   0x08048094 <+20>: je     0x80480dc <YouWin>

   0x0804809a <+26>: call   0x8048103 <exit>

End of assembler dump.


(gdb) p 0x10f

$1 = 271

(gdb) q

level1@io:/levels$ ./level01

Enter the 3 digit passcode to enter: 271

Congrats you found it, now read the password for level2 from /home/level2/.pass


sh-4.2$ whoami

level2



level05 까지는 딱히 풀이가 없으니 대충 넘어가도 될듯

'Pwnable > io.smashthestack.org' 카테고리의 다른 글

[io.smashthestack.org] level06  (0) 2015.01.04
[io.smashthestack.org] level05  (0) 2015.01.04
[io.smashthestack.org] level04  (0) 2015.01.04
[io.smashthestack.org] level03  (0) 2015.01.04
[io.smashthestack.org] level02  (0) 2015.01.04
댓글
공지사항
최근에 올라온 글
최근에 달린 댓글
Total
Today
Yesterday
링크
TAG
more
«   2025/02   »
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28
글 보관함