0
votes
1answer
321 views

gdb Cannot access memory at address of $ebp

Entire code is: #include <stdio.h> #include <string.h> #include <unistd.h> char *secret = "1234"; void go_shell() { char *shell = "/bin/sh"; char *cmd[] = { "/bin/sh", 0}; ...
2
votes
2answers
82 views

Can anyone clearly explain this disassembly?

i am new to debugging. I came through this code which states that it spawns a shell prompt when executed. 0:  31 c0                   xor    eax,eax 2:  50                      push   eax 3:  68 2f ...
0
votes
1answer
379 views

I can't understand this error message in ARM

My assembly code is 00000000 <_start>: 0: e28f6001 add r6, pc, #1 4: e12fff16 bx r6 8: 1b24 subs r4, r4, r4 a: 1c20 adds r0, r4, #0 c: 4a01 ...
0
votes
1answer
1k views

Grabbing 128bit key from shellcode

I'm trying to take out a 128bit key from shellcode. I have compiled shellcode as a C code within an array which is like #include <stdio.h> #include <stdlib.h> /*shellcode.c*/ char code[] ...
0
votes
2answers
928 views

Address woes from Hacking: The Art of Exploitation [closed]

I bought this book recently titled: Hacking: The Art of Exploitation (2nd Edition) and it's been bugging me so much lately. Anyway, with one of the examples, firstprog.c : #include <stdio.h> ...
2
votes
2answers
2k views

Format string bugs - exploitation

I'm trying to exploit my format string bug, which lies in this program: #include <sys/types.h> #include <sys/uio.h> #include <unistd.h> #include <stdio.h> #include <string....