NJUPT-CSAPP/AttackLab/target26
2024-06-12 23:13:45 +08:00
..
results Add attack lab 2024-06-12 23:13:45 +08:00
cookie.txt Add attack lab 2024-06-12 23:13:45 +08:00
ctarget Add attack lab 2024-06-12 23:13:45 +08:00
ctarget.txt Add attack lab 2024-06-12 23:13:45 +08:00
farm.c Add attack lab 2024-06-12 23:13:45 +08:00
farm.o Add attack lab 2024-06-12 23:13:45 +08:00
farm.txt Add attack lab 2024-06-12 23:13:45 +08:00
hex2raw Add attack lab 2024-06-12 23:13:45 +08:00
printf.so Add attack lab 2024-06-12 23:13:45 +08:00
README.txt Add attack lab 2024-06-12 23:13:45 +08:00
rtarget Add attack lab 2024-06-12 23:13:45 +08:00
rtarget.txt Add attack lab 2024-06-12 23:13:45 +08:00
tmp Add attack lab 2024-06-12 23:13:45 +08:00

This file contains materials for one instance of the attacklab.

Files:

    ctarget

Linux binary with code-injection vulnerability.  To be used for phases
1-3 of the assignment.

    rtarget

Linux binary with return-oriented programming vulnerability.  To be
used for phases 4-5 of the assignment.

     cookie.txt

Text file containing 4-byte signature required for this lab instance.

     farm.c

Source code for gadget farm present in this instance of rtarget.  You
can compile (use flag -Og) and disassemble it to look for gadgets.

     hex2raw

Utility program to generate byte sequences.  See documentation in lab
handout.