|
You are here |
satharus.me | ||
| | | | |
www.bitsnbites.eu
|
|
| | | | | [AI summary] This article introduces the MRISC32 architecture, its compiler, simulator, and examples of compiling and running programs, including a DOOM demo. | |
| | | | |
gebir.ge
|
|
| | | | | [AI summary] The article discusses two methods for modifying the behavior of the `strcmp` function in a program. The first method involves directly patching the binary to change the conditional jump instruction that determines the return value. The second method uses `LD_PRELOAD` to override the `strcmp` function with a custom implementation that inverts the return value of the original function. Both approaches aim to correct the program's incorrect handling of string comparison by reversing the logic of the return value. | |
| | | | |
joellaity.com
|
|
| | | | | ||
| | | | |
blog.nuculabs.dev
|
|
| | | Hello, In this article I'll present you my solution on the Chapter 5 CTF from the book Practical Binary Analysis. For this binary, the hint is to fix four broken things. Running file gives us the following response: 1 2 binary@binary-VirtualBox:~/ctf$ file ./lvl3 ./lvl3: ERROR: ELF 64-bit LSB executable, Motorola Coldfire, version 1 (Novell Modesto) error reading (Invalid argument) And the readelf command gives us: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 binary@binary-VirtualBox:~/ctf$ readelf -h ./lvl3 ELF Header: Magic: 7f 45 4c 46 02 01 01 0b 00 00 00 00 00 00 00 00 Class: ELF64 Data: 2's complement, little endian Version: 1 (current) OS/ABI: Novell - Modesto ABI Version: 0 Type: EXEC (Executable file) Machine: Motorola Coldfire Version: ... | ||