[SPCA] Update code imports

This commit is contained in:
2026-01-22 07:35:37 +01:00
parent f92b002524
commit 5dffd7391c
18 changed files with 28 additions and 30 deletions

View File

@@ -23,7 +23,7 @@ There are 2 ways to do this:
For example, consider this code:
\inputcodewithfilename{c}{code-examples/00_c/05_vulnerabilities/}{01_buffer_overflow_echo.c}
\inputcodewithfilename{c}{}{code-examples/00_c/05_vulnerabilities/01_buffer_overflow_echo.c}
This is a problem, since \texttt{echo} may be compiled to something similar to this:
@@ -44,4 +44,4 @@ Return-oriented Programming is a more sophisticated exploit, which does not rely
The key idea is: Overwrite return addresses and jump to \textit{specific} machine instruction sequences \textit{already present} in process memory.
% This is only covered in the attack-lab exercise, not the slides.
% This is only covered in the attack-lab exercise, not the slides.