You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
邓博昊 e1773e3eca ctarget level3 7 months ago
..
README.txt init 7 months ago
cookie.txt init 7 months ago
ctarget init 7 months ago
farm.c init 7 months ago
hex2raw init 7 months ago
phase_1.txt ctarget level1 7 months ago
phase_1_raw.txt ctarget level1 7 months ago
phase_2.txt ctarget level2 7 months ago
phase_2_assembly.d ctarget level2 7 months ago
phase_2_assembly.o ctarget level2 7 months ago
phase_2_assembly.s ctarget level2 7 months ago
phase_2_raw.txt ctarget level2 7 months ago
phase_3.txt ctarget level3 7 months ago
phase_3_assembly.d ctarget level3 7 months ago
phase_3_assembly.o ctarget level3 7 months ago
phase_3_assembly.s ctarget level3 7 months ago
phase_3_raw.txt ctarget level3 7 months ago
rtarget init 7 months ago

README.txt

This file contains materials for one instance of the attacklab.

Files:

ctarget

Linux binary with code-injection vulnerability. To be used for phases
1-3 of the assignment.

rtarget

Linux binary with return-oriented programming vulnerability. To be
used for phases 4-5 of the assignment.

cookie.txt

Text file containing 4-byte signature required for this lab instance.

farm.c

Source code for gadget farm present in this instance of rtarget. You
can compile (use flag -Og) and disassemble it to look for gadgets.

hex2raw

Utility program to generate byte sequences. See documentation in lab
handout.