This is pretty similiar to A08, the only difference being that the push before calling printf is with eax.
eax in this program has stored the results of sub_401000, and we immediately push it onto the stack. By pushing before a function call, we're essentially passing it to the function.
Subscribe to:
Post Comments (Atom)
Sometimes you have to look after yourself (Monitor) #watchyour6
#coding #Monitor #myopinionnotyours During my day today I was asked about how coding is relevant on a cyber detection team. This is a goo...
-
Live Linux forensics in a KVM based environment (part 1) Most of this blog will be based on a image that I created that I will be walking...
-
#coding #Monitor #myopinionnotyours During my day today I was asked about how coding is relevant on a cyber detection team. This is a goo...
-
Background Recently, I wanted to perform some basic fuzzing against a target application. I chose Sulley because it's Python-based and...
No comments:
Post a Comment