好了话不多说我们书接上文继续来做第二个实验下面是前半部分实验的连接 5. 第五关 首先感觉应该是个递归问题 /* Round and 'round in memory we go, where we stop, the bomb blows! */ input = read_line(); phase_5(input); phase_defused(); printf("Good work! On to the next...\n"); 1. 初读phase_5 00000000004
title: privilege-separation date: 2016-01-12 14:40:04 categories: tags: --- Exercise1 In order to gain deeper understanding of the internal architecture of the Touchstone web server, let's use gdb to debug the banksv service.First, launch the server:
title: authentication date: 2016-01-13 14:33:22 categories: information-security tags: authentication --- Exercise1 There are many bugs and vulnerabilities in the current utility for transferring money. Find as many bugs as you can. For now, just foc
title: return-to-libc date: 2016-01-11 17:40:30 categories: information-security tags: return-to-libc --- Exercise1 The Ubuntu 12.04 OS you've been using in this lab has the non-executable stack support by default. To compile a C program, just use th
title: buffer-overflow date: 2016-01-10 14:17:17 categories: information-security tags: buffer-overflow --- Excrcise1 Now, you can write some code. Your job is to print the address of the variable buffer, in the C program stack1.c, and compile the C
MIT6.828 lab1地址:http://pdos.csail.mit.edu/6.828/2014/labs/lab1/ 第一个练习,主要是让我们熟悉汇编,嗯,没什么好说的. Part 1: PC Bootstrap 首先,整个实验使用qemu这款模拟软件来,来对代码进行调试,相当于我们在qemu这个模拟的计算机平台上,运行自己的程序.可以再qemu这个软件上进行gdb的调试,比较方便. 首先看下整个内核在qemu上的模拟的结果: 整个内核现在能实现的就两个功能,一个kerninfo,显示