diff options
author | Navan Chauhan <navanchauhan@gmail.com> | 2023-10-16 16:01:26 -0600 |
---|---|---|
committer | Navan Chauhan <navanchauhan@gmail.com> | 2023-10-16 16:01:26 -0600 |
commit | 13d2fc49885c271b4b3d0235e286588b93c63a86 (patch) | |
tree | acc2001b44489040d88abb924d9fe5e0603c3680 /Content | |
parent | fafd62dd9c374f9ab3075ee0a023d6c68d380e1e (diff) |
update sakura css
Diffstat (limited to 'Content')
-rw-r--r-- | Content/posts/2023-10-05-attack-lab.md | 22 |
1 files changed, 22 insertions, 0 deletions
diff --git a/Content/posts/2023-10-05-attack-lab.md b/Content/posts/2023-10-05-attack-lab.md new file mode 100644 index 0000000..cfd7bd8 --- /dev/null +++ b/Content/posts/2023-10-05-attack-lab.md @@ -0,0 +1,22 @@ +--- +date: 2023-10-05 20:01 +description: Walkthrough of Attack Lab for CSCI 2400 Computer Systems +tags: gdb, reverse-engineering, c++, csci2400, assembly +draft: true +--- + +# Attack Lab + +## Introduction + +Lab 3 for CSCI 2400 @ CU Boulder - Computer Systems + +> This assignment involves generating a total of five attacks on two programs having different security vulnerabilities. The directions for this lab are detailed but not difficult to follow. + +Again, I like using objdump to disassemble the code. + +`objdump -d ctarget > dis.txt` + +## Phase 1 + +From the instructions, we know that our task is to get `CTARGET` to execute the code for `touch1` when `getbuf` executes its return statement, rather than returning to `test` |