[angr] A question about CADET_00001 the example

Natalie mixianya at 126.com
Thu Sep 1 00:07:27 PDT 2016

 Hello hackers,
       I've got a question about the angr example CADET_00001. As for the code 'pg.explore(find=0x804833E)', of which the address means angr symbolic execution will reach the basic block where the easter egg text is printed. I don't understand how could I get this address? I tried IDA Pro to search for the printed string 'EASTER EGG!' and I found the printing code on 0x80488FC. The address 0x804833E belongs to a function named _init_proc. I just don't get it.
       I would be really appreciated if you can tell me how it worked. Thanks a lot.
       Best regards.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.cs.ucsb.edu/pipermail/angr/attachments/20160901/ecd5732b/attachment-0001.html>

More information about the angr mailing list