📄 readme
字号:
Some files that demonstrate buffer overflow and stack smashing.execls: just shows how to use the exec() system call (it exec's /bin/ls).ov.c: a function that modifies the return address to point to a string. The string actually holds a small version of execls. Once the subroutine returns, it execs /bin/ls instead.vulnerable.c: a program with an overflowable buffer. This program reads from standard input and then stuffs whatever it got into a string. If we give it the right string (that is too large for the buffer and happens to hold a program and substitute return-address - we can turn the program into /bin/ls!genpgm.c: a program that prints out a string that happens to be what we needto mess up the vulnerable program (to make it exec /bin/ls). genpgm needs anoffset specified as a command line parameter - it adds this offset to thefixed number it assumes is the address of the buffer it is overflowing (used to replace the return address on the stack). Usage:genpgm 16 | ./vulnerable16 seems to work.Note that genpgm and vulnerable are tuned to a specific OS(Linux),compiler, libraries, etc. These won't work withoutmodification on other machines/versions of Linux, etc.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -