As I'm sure you're studying reverse engineering, you should also look up what ASLR is. That is the main reason why your program's offset is different from the one from the book. It basically randomizes where your program will be located in the memory so that you can't create an exploit that hardcodes the address to shell code. This makes creating exploit a lot harder.
The addresses you get will almost always be different than the addresses they show in the book. Heck, the addresses will likely change between different runs on your same system.
发布评论
评论(2)
我确信您正在学习逆向工程,因此您还应该查找 ASLR 是什么。这就是您的程序的偏移量与书中的偏移量不同的主要原因。它基本上随机化了程序在内存中的位置,这样您就无法创建将地址硬编码为 shell 代码的漏洞利用程序。这使得创建漏洞变得更加困难。
As I'm sure you're studying reverse engineering, you should also look up what ASLR is. That is the main reason why your program's offset is different from the one from the book. It basically randomizes where your program will be located in the memory so that you can't create an exploit that hardcodes the address to shell code. This makes creating exploit a lot harder.
您获得的地址几乎总是与书中显示的地址不同。哎呀,在同一系统上的不同运行之间,地址可能会发生变化。
The addresses you get will almost always be different than the addresses they show in the book. Heck, the addresses will likely change between different runs on your same system.