tag:blogger.com,1999:blog-3932878064881956934.post1394120222490174752..comments2023-05-22T19:36:11.633+05:30Comments on voidsecurity: Pwnium CTF 2014 - Be a Robot - PWN 200 - [Team SegFault]Reno Roberthttp://www.blogger.com/profile/01980174423078410529noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-3932878064881956934.post-24128737246482042852014-07-10T17:03:36.616+05:302014-07-10T17:03:36.616+05:30renorobert@ubuntu:/host/Pwnium$ strings -a ./pwn20...renorobert@ubuntu:/host/Pwnium$ strings -a ./pwn200 | grep sh<br />.shstrtab<br />.gnu.hash<br /><br /><br />renorobert@ubuntu:/host/Pwnium$ gdb -q ./pwn200<br />gdb-peda$ break main<br />Breakpoint 1 at 0x8048701<br />gdb-peda$ run<br /><br />Breakpoint 1, 0x08048701 in main ()<br />gdb-peda$ find sh<br />Searching for 'sh' in: None ranges<br />Found 86 results, display max 86 items:<br /> pwn200 : 0x8048bc8 ("shstrtab")<br /> pwn200 : 0x8048c01 --> 0x2e006873 ('sh')Reno Roberthttps://www.blogger.com/profile/01980174423078410529noreply@blogger.comtag:blogger.com,1999:blog-3932878064881956934.post-13518411341229796282014-07-09T18:31:13.485+05:302014-07-09T18:31:13.485+05:30hello... i have few question
how do you find &quo...hello... i have few question<br /><br />how do you find "sh" parameter?han hojunghttp://windowhan.tistory.comnoreply@blogger.com