tag:blogger.com,1999:blog-1559831790779967841.post5532483516902128084..comments2023-05-25T16:13:35.829+02:00Comments on blog.ant0i.net - my little techie blog: vortex5antoinethttp://www.blogger.com/profile/11659661081559039635noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-1559831790779967841.post-63401720645441812452022-07-16T15:23:41.761+02:002022-07-16T15:23:41.761+02:00Thhank you for thisThhank you for thisNomad Ninahttps://www.nomadnina.com/noreply@blogger.comtag:blogger.com,1999:blog-1559831790779967841.post-44169245513117294792012-07-31T00:34:36.279+02:002012-07-31T00:34:36.279+02:00All sorted. Let me give you this advise for the ex...All sorted. Let me give you this advise for the exploit: don't think too much.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-1559831790779967841.post-20293046467845019252012-07-28T23:43:14.938+02:002012-07-28T23:43:14.938+02:00I haven't found time yet to work on vortex 6. ...I haven't found time yet to work on vortex 6. I'll post my findings asap :)antoinethttps://www.blogger.com/profile/11659661081559039635noreply@blogger.comtag:blogger.com,1999:blog-1559831790779967841.post-64128667810671882202012-07-28T12:53:33.108+02:002012-07-28T12:53:33.108+02:00Good work so far. I'm stuck at level 6. Decomp...Good work so far. I'm stuck at level 6. Decompiling the binary by hand and getting carbon copy output from gcc is quite simple. Exploit must be very similar to one of the previous level however I'm fighting with a "!". Same on your side ?Anonymousnoreply@blogger.com