nova47
April 2nd, 2011, 11:58 PM
So I've been working through the book Hacking the Art of Exploitation 2nd edition (excellent book for the record) and I got to the example displayed here http://forum.intern0t.net/offensive-guides-information/2902-basic-buffer-overflow-attacks.html. I originally attempted to recreate the buffer overflow on my x64 machine and via gdb noticed that the auth_flag was loaded in memory space lower than password_buffer. However when I recreated the overflow on an x86 machine auth_flag was properly loaded after password_buffer. Why is that?