blob: cfd7bd81039f683b088039af77fa7cde46dd681a (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
|
---
date: 2023-10-05 20:01
description: Walkthrough of Attack Lab for CSCI 2400 Computer Systems
tags: gdb, reverse-engineering, c++, csci2400, assembly
draft: true
---
# Attack Lab
## Introduction
Lab 3 for CSCI 2400 @ CU Boulder - Computer Systems
> This assignment involves generating a total of five attacks on two programs having different security vulnerabilities. The directions for this lab are detailed but not difficult to follow.
Again, I like using objdump to disassemble the code.
`objdump -d ctarget > dis.txt`
## Phase 1
From the instructions, we know that our task is to get `CTARGET` to execute the code for `touch1` when `getbuf` executes its return statement, rather than returning to `test`
|