From f6d2141a480dd6b5b8ee0e48d43bb64773232791 Mon Sep 17 00:00:00 2001 From: Navan Chauhan Date: Tue, 26 Mar 2024 23:38:14 -0600 Subject: add header ids --- docs/posts/2023-10-05-attack-lab.html | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) (limited to 'docs/posts/2023-10-05-attack-lab.html') diff --git a/docs/posts/2023-10-05-attack-lab.html b/docs/posts/2023-10-05-attack-lab.html index d2a1475..81fc27a 100644 --- a/docs/posts/2023-10-05-attack-lab.html +++ b/docs/posts/2023-10-05-attack-lab.html @@ -6,13 +6,13 @@ - Attack Lab + id="attack-lab">Attack Lab - - + Attack Lab" /> + Attack Lab" /> @@ -44,9 +44,9 @@
-

Attack Lab

+

Attack Lab

-

Introduction

+

Introduction

Lab 3 for CSCI 2400 @ CU Boulder - Computer Systems

@@ -59,7 +59,7 @@

objdump -d ctarget > dis.txt

-

Phase 1

+

Phase 1

From the instructions, we know that our task is to get CTARGET to execute the code for touch1 when getbuf executes its return statement, rather than returning to test

@@ -115,7 +115,7 @@ NICE JOB! -

Phase 2

+

Phase 2

Phase 2 involves injecting a small amount of code as part of your exploit string. @@ -275,7 +275,7 @@ NICE JOB! -

Phase 3

+

Phase 3

Phase 3 also involves a code injection attack, but passing a string as argument. @@ -379,7 +379,7 @@ NICE JOB!

Phases 1-3 Complete.

-

Phase 4

+

Phase 4

For Phase 4, you will repeat the attack of Phase 2, but do so on program RTARGET using gadgets from your -- cgit v1.2.3