Shellphish targetted CSDS running CROMU_00055 in round 10.


Type 2 POV

Reading from protected address: 0x4347c766

0x9463ea2 : movsx edx,byte ptr [edx]

Tracing data from eip: 0x9463ea2 tracing source of register: edx (value: 0x4347c766)

0x9465f96 : receive syscall (return)
0x94623b3 : mov esi,dword ptr [esi]
0x94623e9 : mov dword ptr [esp+0xc],esi
0x94628fb : mov eax,dword ptr [eax]
0x94628fd : mov dword ptr [ebp-0x40],eax
0x9462909 : mov esi,dword ptr [ebp-0x40]
0x9462932 : mov dword ptr [esp+0xc],esi
0x9463d4e : mov esi,dword ptr [ebp+0x18]
0x9463d66 : mov dword ptr [ebp-0x20],esi
0x9463e97 : mov edx,dword ptr [ebp-0x20]
0x9463ea2: movsx edx,byte ptr [edx] // address: edx value: 0x4347c766

The application exited with a segmentation fault

0: 0 // esp: 0

Curated by Lunge Technology, LLC. Questions or comments? Send us email