[Lecture-System hacking] Quiz: x86 Assembly 1

2022. 7. 17. 16:12·Wargame/Dreamhack
728x90
반응형

a=[0x67,0x55,0x5c,0x53,0x5f,0x5d,0x55,0x10,0x44,0x5f,0x10,0x51,0x43,0x43,0x55,0x5d,0x52,0x5c,0x49,0x10,0x47,0x5f,0x42,0x5c,0x54,0x11,0x00,0x00,0x00,0x00,0x00,0x00]
print(len(a))
for i in range(len(a)):
    print(chr(a[i]^0x30))
728x90
반응형
저작자표시 비영리 변경금지 (새창열림)

'Wargame > Dreamhack' 카테고리의 다른 글

ssp_001  (0) 2022.07.18
basic_exploitation_001  (0) 2022.07.18
basic_exploitation_000  (0) 2022.07.18
Return Address Overwrite  (0) 2022.07.18
shell_basic  (0) 2022.07.17
'Wargame/Dreamhack' 카테고리의 다른 글
  • basic_exploitation_001
  • basic_exploitation_000
  • Return Address Overwrite
  • shell_basic
wyv3rn
wyv3rn
아저씨의 흔한 취미. wyv3rn#1249
  • wyv3rn
    think storage
    wyv3rn
  • 전체
    오늘
    어제
    • 분류 전체보기 (493)
      • To do list (6)
        • Doing (0)
        • Complete (6)
      • Diary (35)
      • Tips & theory (77)
      • Kernel Exploit (22)
      • Wargame (313)
        • pwn.college (34)
        • Dreamhack (148)
        • pwnable.kr (15)
        • Lord of Sqlinjection (3)
        • Cryptohack (20)
        • Root me (27)
        • CodeEngn (4)
        • Exploit Education (22)
        • ROP Emporium (8)
        • H4C (10)
        • Hackerchool (22)
      • CTF (40)
        • Solved (38)
        • Unsolved (2)
      • Script (0)
  • 블로그 메뉴

    • 홈
    • 방명록
  • 링크

  • 공지사항

    • PWN wargame 모음 (및 느낀점)
    • 비공개 글들에 대해.
    • 뭐라도 하나 얻어가시길...
  • 인기 글

  • 태그

    Buffer Overflow
    tcache
    heap
    root-me
    cryptohack
    hackerschool
    docker
    BOF
    64bit
    phoenix
    ROOT ME
    32bit
    vtable
    pwnable.kr
    rop
    la ctf
    dreamhack
    root
    x86
    lob
    RTL
    _IO_FILE
    Format String Bug
    CANARY
    x64
    pwntools
    libc
    exploit education
    FSB
    Me
  • 최근 댓글

  • 최근 글

  • 250x250
    반응형
  • hELLO· Designed By정상우.v4.10.3
wyv3rn
[Lecture-System hacking] Quiz: x86 Assembly 1
상단으로

티스토리툴바