summaryrefslogtreecommitdiff
path: root/Content/posts/2023-10-05-attack-lab.md
diff options
context:
space:
mode:
authorNavan Chauhan <navanchauhan@gmail.com>2023-10-16 16:01:26 -0600
committerNavan Chauhan <navanchauhan@gmail.com>2023-10-16 16:01:26 -0600
commit13d2fc49885c271b4b3d0235e286588b93c63a86 (patch)
treeacc2001b44489040d88abb924d9fe5e0603c3680 /Content/posts/2023-10-05-attack-lab.md
parentfafd62dd9c374f9ab3075ee0a023d6c68d380e1e (diff)
update sakura css
Diffstat (limited to 'Content/posts/2023-10-05-attack-lab.md')
-rw-r--r--Content/posts/2023-10-05-attack-lab.md22
1 files changed, 22 insertions, 0 deletions
diff --git a/Content/posts/2023-10-05-attack-lab.md b/Content/posts/2023-10-05-attack-lab.md
new file mode 100644
index 0000000..cfd7bd8
--- /dev/null
+++ b/Content/posts/2023-10-05-attack-lab.md
@@ -0,0 +1,22 @@
+---
+date: 2023-10-05 20:01
+description: Walkthrough of Attack Lab for CSCI 2400 Computer Systems
+tags: gdb, reverse-engineering, c++, csci2400, assembly
+draft: true
+---
+
+# Attack Lab
+
+## Introduction
+
+Lab 3 for CSCI 2400 @ CU Boulder - Computer Systems
+
+> This assignment involves generating a total of five attacks on two programs having different security vulnerabilities. The directions for this lab are detailed but not difficult to follow.
+
+Again, I like using objdump to disassemble the code.
+
+`objdump -d ctarget > dis.txt`
+
+## Phase 1
+
+From the instructions, we know that our task is to get `CTARGET` to execute the code for `touch1` when `getbuf` executes its return statement, rather than returning to `test`