这个作业很刺激。。。
syr cis341 solution
Project 2: Buffer Overflow
1. Objective
Buffer overflows have been the most common form of security vulnerability in the
last ten years. Moreover, buffer overflow vulnerabilities dominate in the area of
remote network penetration vulnerabilities, where an anonymous Internet user seeks
to gain partial or total control of a host. These kinds of attacks enable anyone to take
total control of a host and thus represent one of the most serious security threats. [1]
Definition of buffer overflow from Wikipedia [2]: A buffer overflow, or buffer
overrun, is an anomaly where a program, while writing data to a buffer, overruns the
buffer’s boundary and overwrites adjacent memory. This is a special case of violation
of memory safety.
The goal of this lab is to get intimately familiar with the layout and use of data section,
code section and, particularly, call stacks, as well as MIPS machine language,
assembly and disassembly, debugging, and reverse engineering. As a side ben