Skip to content

Instantly share code, notes, and snippets.

@fgsahoward
Created June 11, 2018 15:30
Show Gist options
  • Save fgsahoward/e639dbb8863a2bb8836f6e8e2aa9cc30 to your computer and use it in GitHub Desktop.
Save fgsahoward/e639dbb8863a2bb8836f6e8e2aa9cc30 to your computer and use it in GitHub Desktop.
[howard@sterling shellcodes]$ gdb -q ../easy32
Reading symbols from ../easy32...done.
(gdb) disas vulnerable
Dump of assembler code for function vulnerable:
0x0804844b <+0>: push %ebp
0x0804844c <+1>: mov %esp,%ebp
0x0804844e <+3>: sub $0x408,%esp
0x08048454 <+9>: sub $0x8,%esp
0x08048457 <+12>: pushl 0x8(%ebp)
0x0804845a <+15>: lea -0x408(%ebp),%eax
0x08048460 <+21>: push %eax
0x08048461 <+22>: call 0x8048310 <strcpy@plt>
0x08048466 <+27>: add $0x10,%esp
0x08048469 <+30>: sub $0x8,%esp
0x0804846c <+33>: lea -0x408(%ebp),%eax
0x08048472 <+39>: push %eax
0x08048473 <+40>: push $0x8048550
0x08048478 <+45>: call 0x8048300 <printf@plt>
0x0804847d <+50>: add $0x10,%esp
0x08048480 <+53>: nop
0x08048481 <+54>: leave
0x08048482 <+55>: ret
End of assembler dump.
(gdb)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment