Address woes from Hacking: The Art of Exploitation [closed]

狂风中的少年 提交于 2019-12-04 20:40:37
JosephH

As I'm sure you're studying reverse engineering, you should also look up what ASLR is. That is the main reason why your program's offset is different from the one from the book. It basically randomizes where your program will be located in the memory so that you can't create an exploit that hardcodes the address to shell code. This makes creating exploit a lot harder.

The addresses you get will almost always be different than the addresses they show in the book. Heck, the addresses will likely change between different runs on your same system.

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!