Idea: The stack would need to look like:
Idea: The stack would need to look like:
To find the "/bin/sh"
string use the searchmem
command in GDB PEDA.
Idea: Used fixed addresses for system()
and "/bin/sh"
and run the exploit test command until the addresses match.
Idea: The stack would need to look like:
mprotect()
mprotect()
mprotect()
…