summaryrefslogtreecommitdiff
path: root/Content/posts/2023-10-05-attack-lab.md
blob: cfd7bd81039f683b088039af77fa7cde46dd681a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
---
date: 2023-10-05 20:01
description: Walkthrough of Attack Lab for CSCI 2400 Computer Systems
tags: gdb, reverse-engineering, c++, csci2400, assembly
draft: true
---

# Attack Lab

## Introduction

Lab 3 for CSCI 2400 @ CU Boulder - Computer Systems

> This assignment involves generating a total of five attacks on two programs having different security vulnerabilities.  The directions for this lab are detailed but not difficult to follow.

Again, I like using objdump to disassemble the code. 

`objdump -d ctarget > dis.txt`

## Phase 1

From the instructions, we know that our task is to get `CTARGET` to execute the code for `touch1` when `getbuf` executes its return statement, rather than returning to `test`