MetaCTF: fix

This commit is contained in:
thomashaw
2021-03-22 20:41:23 +00:00
parent 7e79a6e02a
commit 7797bf63ee

View File

@@ -7,7 +7,7 @@ if [[ ARGC -gt 0 ]] then
# No randomisation, this is a static example to demonstrate a stack-based exploit failing due to nx stack
cat program.c.template > program.c
gcc -g -m32 -fno-stack-protector -z norelro -fno-pie -no-pie -Wl,--section-start=.text=0x64574b7a: -mpreferred-stack-boundary=2 -o obj/$USER/$BINNAME program.c
gcc -g -m32 -fno-stack-protector -z norelro -fno-pie -no-pie -Wl,--section-start=.text=0x64574b7a -mpreferred-stack-boundary=2 -o obj/$USER/$BINNAME program.c
end
else
echo "USAGE: build.zsh <user_email(s)>"