Assembly Report
Assembly Report
it was mentioned in attached pdf file. Using objdump, founded starting address of touch1
and I wrote it to a txt file but it failed because ı forgot to overflow attack then I founded
buffer size from getbuf function and changed my file and when I retried new exploit txt file it
passed as below code for my target12.
2) I need code for cookie for exploit string in this part. I got an error about
connecting to server while running the gnu debugger in this part of the
assignment but after i used run -q flag instead of run it solved my problem
and I was able to run the code. Firstly I runned ctarget but returned in
getbuf so ı used a break in getbuf.After rerunning function again I
disassembled and found the stack pointer as 0x 55617480
I runned the ctarget wrote injection code for first argument rdi in pdf file it
was cookie so ı used cookie, rdi and then retq function as Cookie = 0x50fa73aa.
Used objdump -d again to find adress
Finally with getting location of the touch2 as below 0x40188c. passed the
test for phase2 of exploit attack.
3)
To not to fail in this part I must type ascii of cookie for location of touch3 function according
to pdf file. First I got the adress of touch3 function