Idea: The stack would need to look like:
Idea: The stack would need to look like:
To find the "/bin/sh" string use the searchmem command in GDB PEDA.
Idea: Used fixed addresses for system() and "/bin/sh" and run the exploit test command until the addresses match.
Idea: The stack would need to look like:
mprotect()mprotect()mprotect()…