I'm using the latest ubuntu 18.04 and ROPGenerator.
When I try the cmd syscall in exploit mode, some of the constants need rebase because the generated payload uses it as the address to be written.
See the screenshot.
P.S. When I exit the ROPGenerator, my personal preference is to press Ctrl+D. But in that way, Python will throw an annoying EOFError. If you can fix that I'll be very grateful.
Anyway, thanks for the great tool.
I'm using the latest ubuntu 18.04 and ROPGenerator. When I try the cmd
syscall
in exploit mode, some of the constants need rebase because the generated payload uses it as the address to be written. See the screenshot. P.S. When I exit the ROPGenerator, my personal preference is to press Ctrl+D. But in that way, Python will throw an annoying EOFError. If you can fix that I'll be very grateful. Anyway, thanks for the great tool.