Vulnerability Development mailing list archives

Re: CSR: Exploitation Challenge


From: supers0nic () redwhitearmy com
Date: 20 Jul 2005 01:19:02 -0000

Is it really possible?   I compiled it, and for ex, looking for the address of printf.  However gdb said:

gdb> p printf
$2 = {<text variable, no debug info>} 0xb7e93758 <printf>
gdb>


actually its address varies according to the application even if it's dynamically linked.  Or am I missing a point?

If this binary is accessible through gdb, it means I already have shell access and it's somewhat meaningless...


Current thread: