From 13d2fc49885c271b4b3d0235e286588b93c63a86 Mon Sep 17 00:00:00 2001 From: Navan Chauhan Date: Mon, 16 Oct 2023 16:01:26 -0600 Subject: update sakura css --- Content/posts/2023-10-05-attack-lab.md | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 Content/posts/2023-10-05-attack-lab.md (limited to 'Content') diff --git a/Content/posts/2023-10-05-attack-lab.md b/Content/posts/2023-10-05-attack-lab.md new file mode 100644 index 0000000..cfd7bd8 --- /dev/null +++ b/Content/posts/2023-10-05-attack-lab.md @@ -0,0 +1,22 @@ +--- +date: 2023-10-05 20:01 +description: Walkthrough of Attack Lab for CSCI 2400 Computer Systems +tags: gdb, reverse-engineering, c++, csci2400, assembly +draft: true +--- + +# Attack Lab + +## Introduction + +Lab 3 for CSCI 2400 @ CU Boulder - Computer Systems + +> This assignment involves generating a total of five attacks on two programs having different security vulnerabilities. The directions for this lab are detailed but not difficult to follow. + +Again, I like using objdump to disassemble the code. + +`objdump -d ctarget > dis.txt` + +## Phase 1 + +From the instructions, we know that our task is to get `CTARGET` to execute the code for `touch1` when `getbuf` executes its return statement, rather than returning to `test` -- cgit v1.2.3