pico2024 format string 1

Описание к видео pico2024 format string 1

The format string vulnerability allows us to walk up the stack and view its contents. Since this is a 64-bit executable, we need to use %llx to view the 64-bit numbers in hexadecimal. Using %16$llx allows us to walk 16 spaces up the stack. We then need to reverse the endianness to get the flag string (since the Intel architecture is little endian, and converting hex to ascii).

Комментарии

Информация по комментариям в разработке