Explore
/
Sign In
/
Unknown
Unknown
Fork
Star
Artifacts
function
main
decompiled.c
0 lines
|
37.57 KB
_ABI(SystemV_x86_64) struct_157 main(void) { struct_132 stack; generic32_t var_0; int8_t *var_1; int32_t var_2; int32_t var_3; int32_t var_4; int32_t var_5; int32_t var_6; int32_t var_7; int32_t var_8; int32_t var_9; int32_t var_10; int32_t var_11; stack.offset_56 = *(generic64_t *) 40; var_11 = setvbuf_2((FILE_4 *) segment_3.bss.offset_16, (int8_t *) NULL, (int32_t) 2, 0); var_10 = setvbuf_2((FILE_4 *) segment_3.bss.offset_0, (int8_t *) NULL, (int32_t) 2, 0); var_9 = puts_2((const int8_t *) "GOT Hijacking Challenge"); var_8 = printf_2((const int8_t *) "Here's a leak: %p\n"); stack.offset_0 = 0; stack.offset_4 = 0; var_7 = puts_2((const int8_t *) "Give me the address: "); var_6 = __isoc99_scanf_2((const int8_t *) "%d"); var_5 = getchar_2(); var_4 = puts_2((const int8_t *) "Give me the value: "); var_3 = __isoc99_scanf_2((const int8_t *) "%d"); var_2 = getchar_2(); var_0 = stack.offset_0; stack.offset_8 = var_0; *(generic32_t *) var_0 = stack.offset_4; var_1 = gets_2((int8_t *) ((pointer_or_number64_t) &stack.offset_8 + 8)); if (stack.offset_56 != *(generic64_t *) 40) { __stack_chk_fail_2(); } struct_157 var_12; var_12.offset_0 = 0; var_12.offset_8 = 0; return var_12; }
Loading...