Vulnerability Development mailing list archives
Re: CSR: Exploitation Challenge
From: supers0nic () redwhitearmy com
Date: 20 Jul 2005 01:19:02 -0000
Is it really possible? I compiled it, and for ex, looking for the address of printf. However gdb said: gdb> p printf $2 = {<text variable, no debug info>} 0xb7e93758 <printf> gdb> actually its address varies according to the application even if it's dynamically linked. Or am I missing a point? If this binary is accessible through gdb, it means I already have shell access and it's somewhat meaningless...
Current thread:
- CSR: Exploitation Challenge Steven Hill (Jul 07)
- <Possible follow-ups>
- Re: CSR: Exploitation Challenge supers0nic (Jul 22)