exploits

Buffer Overflow

My solution to Phase 3 of the CMU attack lab which involves a code injection attack, passing a string as argument to touch3(char *) the accepted string is the following cookie 0x59b997fa. The CMU Attack lab: https://csapp.cs.cmu.edu/3e/attacklab.pdf I start by recording some data. The line 0x00000000004017a8 <+0>: sub $0x28,%rsp tells us that the buffer being

Scroll UpScroll Up