From 8b9273bb303123f1584bd77de94d8770021fedbc Mon Sep 17 00:00:00 2001 From: Mark Uchechukwu <127159644+h4ckyou@users.noreply.github.com> Date: Thu, 3 Oct 2024 12:39:35 +0100 Subject: [PATCH] Update README.md --- Pwn/Ret2win 2/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Pwn/Ret2win 2/README.md b/Pwn/Ret2win 2/README.md index f71fddf..7238f99 100644 --- a/Pwn/Ret2win 2/README.md +++ b/Pwn/Ret2win 2/README.md @@ -18,7 +18,7 @@ So we are working with a 64 bits executable which is dynamically linked and not Let us run it to get an overview of what it does ![image](https://github.com/user-attachments/assets/779cadb5-7269-4277-b93b-9e4adf1c3650) -So the program asks if we have any feedback, if we do not it exists else it receives 3 feedbacks from us +So the program asks if we have any feedback, if we do not it exits else it receives 3 feedbacks from us Interesting! in order to find the vulnerabiltiy we need to decompile the binary and my choice here is IDA