https://github.com/gomjellie/sp_attacklab
buffer overflow
https://github.com/gomjellie/sp_attacklab
Last synced: 3 months ago
JSON representation
buffer overflow
- Host: GitHub
- URL: https://github.com/gomjellie/sp_attacklab
- Owner: gomjellie
- Created: 2019-10-17T15:36:45.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2019-10-20T17:49:31.000Z (over 5 years ago)
- Last Synced: 2025-01-23T11:25:28.494Z (5 months ago)
- Language: Shell
- Homepage:
- Size: 60.5 KB
- Stars: 0
- Watchers: 1
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README
Awesome Lists containing this project
README
## Try to run ctarget
./ctarget /ookie: 0x47db4e3a
Touch2!: You called touch2(0x47db4e3a)
Valid solution for level 2 with target ctarget
PASS: Would have posted the following:./ctarget -q // This will work.
##########################
## solve the problem 1. ##
##########################
vi ans1.txt
./hex2raw < ans1.txt > ans1.raw
./ctarget -q -i ans1.rawYou will see the following message if you succeed.
Cookie: 0x47db4e3a
Touch1!: You called touch1()
Valid solution for level 1 with target ctarget
PASS: Would have posted the following:##########################
## solve the problem 2. ##
##########################
vi ans2.txt
./hex2raw < ans2.txt > ans2.raw
./ctarget -q -i ans2.rawYou will see the following message if you succeed.
ejlee@j200:~/lecture/sp19f/attacklab/targets/target2$ ./ctarget -q -i ans2.raw
Cookie: 0x47db4e3a
Touch2!: You called touch2(0x47db4e3a)
Valid solution for level 2 with target ctarget
PASS: Would have posted the following: