零基礎(chǔ)入門(mén)windows軟件逆向分析
int main(int argc, char *argv[]) {
printf("Try to exec /bin/sh");
vuln();
return 0;}
/* Compile: gcc -fno-stack-protector -z execstack 1.c -o 1 */
/* ?Disable ASLR: echo 0 > /proc/sys/kerne/randomize_va_space */
標(biāo)簽: