Skip to content

Commit

Permalink
Fix readme
Browse files Browse the repository at this point in the history
  • Loading branch information
bkerler committed Jan 2, 2018
1 parent a5c8b49 commit d5353f1
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ Usage:
$ gdb-multiarch ./exploit
```

- Use "si" to step into functions or "so" to step over functions, "info functions" to print all functions, "b [function]" to set a breakpoint and "b *0x1234" to set a breakpoint at addr 0x1234, "x/[dwords]x" to print offsets, for example "x/4x 0x1234" and "x/[dwords]x $reg" to print register contents, for example "x/4x $sp"
- GDB Basics: Use "si" to step into functions or "so" to step over functions, "info functions" to print all functions, "b [function]" (Example: "b main" to set a breakpoint and "b *0x1234" to set a breakpoint at addr 0x1234, "c" to continue program, "x/[dwords]x" to print offsets, for example "x/4x 0x1234" and "x/[dwords]x $reg" to print register contents, for example "x/4x $sp". Using pwndbg, you can use "rop" to list rop gadgets, for example "rop --grep 'pop {r3'" to list gadgets which pop values from stack to r3. See https://github.com/pwndbg/pwndbg/blob/dev/FEATURES.md for more details !

- After you've exploited correctly, you will see the password for the next level
So if level2 password would be "Level2":
Expand Down

0 comments on commit d5353f1

Please sign in to comment.