Graduate School of Information Security MIN CHUL, KIM HACKING – THE ART OF EXPLOITATION Ox28O BUILDING ON BASIC - ANALYSIS SOURCE CODE
CONTENTS Simplenote.c Bitwise.c Functioncontrol_flags.c UserID_demo.c Notetaker.c Notesearch.c Time_example.c Functionponter_example.c Rand_example.c Game_of_chance.c
SIMPLENOTE.C Permission part
IMPLEMENT SIMPLENOTE.C
BUFFER OVERFLOW memory File save location Buffer destination Buffer start
IMPLEMENT SIMPLENOTE.C
BITWISE.C i12a=i&2b=i&
IMPLEMENT BITWISE.C
FUNCTIONCONTROL_FLAGS. C ♧ mask shift ♧ value=0
IMPLEMENT FCNTL_FLAGS.C
FILE PERMISSIONS -rw-r-r--1nare :57simplenote.c permissionlinkusergroupfile sizedatetimefile name Detail
FILE PERMISSIONS ownershipgroupothers r read w write x operate rwxrwx Change ownership chown [ownership][.group] [file name] Change permission chmod [number or symbol] [file name] -rw-r-r--1nare :57simplenote.c permissionlinkusergroupfile sizedatetimefile name Symbol uownership+add permission ggroup-del permission oothers=only permission aallsfile owned user
USER IDs Change shell user login shell
USER IDs Locked
HACKING.h Making header file Easy to use function
NOTETAKER.c
IMPLEMENT NOTETAKER.c User id
NOTESEARCH.c
IMPLEMENT NOTESEARCH.c Independent
TIME_EXAMPLE.C
TIME_EXAMPLE2.C
IMPLEMENT TIME_EXAMPLE2.C
FUNCTION POINTER.C
RAND_EXAMPLE.C
Different
GAME OF CHANCE.C
PLAY‘GAME OF CHANCE’ I didn’t win the game. T_T