@@ -13,16 +13,16 @@ tags:
1313
1414# Table of Contents
1515
16- 1 . [ Description and Hints] ( #orgd259909 )
17- 2 . [ Assets] ( #org9fbf909 )
18- 1 . [ ` picker-IV.c ` ] ( #org30a98ad )
19- 2 . [ ` picker-IV ` ] ( #org57a6bc5 )
20- 3 . [ Input ` win ` 's address to get the flag] ( #org927a1f8 )
21- 4 . [ Takeaways] ( #org8ae92de )
22- 5 . [ Risks and Mitigations] ( #orgb6acb4d )
16+ 1 . [ Description and Hints] ( #org4d3af5f )
17+ 2 . [ Assets] ( #org9c94ccc )
18+ 1 . [ ` picker-IV.c ` ] ( #org7a632bb )
19+ 2 . [ ` picker-IV ` ] ( #org1469e7b )
20+ 3 . [ Input ` win ` 's address to get the flag] ( #org0f9a3da )
21+ 4 . [ Takeaways] ( #org5d85c8d )
22+ 5 . [ Risks and Mitigations] ( #org8c20a25 )
2323
2424
25- <a id =" orgd259909 " ></a >
25+ <a id =" org4d3af5f " ></a >
2626
2727# Description and Hints
2828
@@ -36,7 +36,7 @@ and given the following hints:
3636> 2 . How can you find the address that ` win ` is at?
3737
3838
39- <a id =" org9fbf909 " ></a >
39+ <a id =" org9c94ccc " ></a >
4040
4141# Assets
4242
@@ -46,7 +46,7 @@ We are given the following assets:
46462 . Its source code ` picker-IV.c ` .
4747
4848
49- <a id =" org30a98ad " ></a >
49+ <a id =" org7a632bb " ></a >
5050
5151## ` picker-IV.c `
5252
@@ -127,7 +127,7 @@ ELF files are *programs*: a chunk of bytes that we can run on the computer, and
127127In the next section we analyze the chunk we got here.
128128
129129
130- <a id =" org57a6bc5 " ></a >
130+ <a id =" org1469e7b " ></a >
131131
132132## ` picker-IV `
133133
@@ -162,7 +162,7 @@ readelf --symbols picker-IV | grep win
162162The address of ` win ` is ` 40129e ` .
163163
164164** Note:** If we run the command without the ` grep ` part, we can see the headers of the symbol table.
165- * Value* is the value of the memory address, and * Name* the name of the symbol; in our case the ` FUNCTION ` ` win ` .
165+ * Value* is the value of the memory address, and * Name* the name of the symbol; in our case the ` FUNC~tion ~ win` .
166166Below we can see a stripped output with just the header and ` win ` 's line.
167167
168168{% highlight shell %}
@@ -173,7 +173,7 @@ readelf --symbols picker-IV
173173 63: 000000000040129e 150 FUNC GLOBAL DEFAULT 15 win
174174
175175
176- <a id =" org927a1f8 " ></a >
176+ <a id =" org0f9a3da " ></a >
177177
178178# Input ` win ` 's address to get the flag
179179
@@ -236,7 +236,7 @@ There's the same address, but with the prefix `0x`.
236236This also makes it much easier * reverse engineering* that binary.
237237
238238
239- <a id =" org8ae92de " ></a >
239+ <a id =" org5d85c8d " ></a >
240240
241241# Takeaways
242242
@@ -247,7 +247,7 @@ This also makes it much easier *reverse engineering* that binary.
247247 We may use ` readelf ` or ` gdb ` for that.
248248
249249
250- <a id =" orgb6acb4d " ></a >
250+ <a id =" org8c20a25 " ></a >
251251
252252# Risks and Mitigations
253253
0 commit comments