Skip to content

Commit 4f13652

Browse files
committed
Add winning inputs.
1 parent 4271fc3 commit 4f13652

File tree

2 files changed

+4
-0
lines changed

2 files changed

+4
-0
lines changed

montevideo/notes.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -18,3 +18,5 @@ call #454c
1818
{% endhighlight %}
1919

2020
Luckily this sequence of instructions does not have a null in it. Note what we do here: we move the constant #0xff7f to a `r5`. Then we clear the high byte using `mov.b` to move the register to itself; now we have `#0x007f` in `r5`, and from here, we just push it, then call `INT`.
21+
22+
### input: `35407fff45450512b0124c4511111111ee43`

whitehorse/notes.markdown

+2
Original file line numberDiff line numberDiff line change
@@ -28,3 +28,5 @@ At the beginning, we have 16 bytes of spaces, which is enough for our shellcode
2828
Like in the previous buffer overflow attack, we have to write past the end of the buffer, and overwrite the return address of `login`. In this case, the address we want it to jump to is the start of the buffer.
2929

3030
That's it; after jump, it executes the shellcode, triggering the open deadbolt interrupt, and giving us access.
31+
32+
### input: `30127f00b01232450000000000000000b432`

0 commit comments

Comments
 (0)