mirror of
https://github.com/janishutz/eth-summaries.git
synced 2026-03-14 23:10:03 +01:00
[SPCA] Update code imports
This commit is contained in:
@@ -23,7 +23,7 @@ There are 2 ways to do this:
|
||||
|
||||
For example, consider this code:
|
||||
|
||||
\inputcodewithfilename{c}{code-examples/00_c/05_vulnerabilities/}{01_buffer_overflow_echo.c}
|
||||
\inputcodewithfilename{c}{}{code-examples/00_c/05_vulnerabilities/01_buffer_overflow_echo.c}
|
||||
|
||||
This is a problem, since \texttt{echo} may be compiled to something similar to this:
|
||||
|
||||
@@ -44,4 +44,4 @@ Return-oriented Programming is a more sophisticated exploit, which does not rely
|
||||
|
||||
The key idea is: Overwrite return addresses and jump to \textit{specific} machine instruction sequences \textit{already present} in process memory.
|
||||
|
||||
% This is only covered in the attack-lab exercise, not the slides.
|
||||
% This is only covered in the attack-lab exercise, not the slides.
|
||||
|
||||
Reference in New Issue
Block a user