Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

使用pattern.py进行fuzz时地址出错 #7

Open
ftk-sostupid opened this issue Nov 27, 2017 · 1 comment
Open

使用pattern.py进行fuzz时地址出错 #7

ftk-sostupid opened this issue Nov 27, 2017 · 1 comment

Comments

@ftk-sostupid
Copy link

蒸米师傅我在用pattern生成的150字节数据填充gdb附加的level1的时候,返回信息如下:
(gdb) run
Starting program: /root/test1
Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae3Ae4Ae5Ae6Ae7Ae8Ae9

Program received signal SIGSEGV, Segmentation fault.
0x00005555555546aa in vulnerable_function ()
(gdb)
这里的地址0x00005555555546aa格式为什么是这样,是哪里出了问题还是编译的时候ASLR关闭失败了?

@ftk-sostupid
Copy link
Author

上面的问题好像是因为我的系统是64位的。。。

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant