Download presentation
Presentation is loading. Please wait.
Published byCynthia Stone Modified over 9 years ago
1
Graduate School of Information Security MIN CHUL, KIM HACKING – THE ART OF EXPLOITATION Ox28O BUILDING ON BASIC - ANALYSIS SOURCE CODE
2
CONTENTS Simplenote.c Bitwise.c Functioncontrol_flags.c UserID_demo.c Notetaker.c Notesearch.c Time_example.c Functionponter_example.c Rand_example.c Game_of_chance.c
3
SIMPLENOTE.C Permission part
4
IMPLEMENT SIMPLENOTE.C
5
BUFFER OVERFLOW memory File save location Buffer destination Buffer start
6
IMPLEMENT SIMPLENOTE.C
7
BITWISE.C i12a=i&2b=i&1 000011000 101 1001 2 011010 311011011
8
IMPLEMENT BITWISE.C
9
FUNCTIONCONTROL_FLAGS. C ♧ mask shift ♧ value=0
10
IMPLEMENT FCNTL_FLAGS.C
11
FILE PERMISSIONS -rw-r-r--1nare 18722014-09-1712:57simplenote.c permissionlinkusergroupfile sizedatetimefile name Detail
12
FILE PERMISSIONS ownershipgroupothers r read w write x operate rwxrwx 4214-1-2- 752 Change ownership chown [ownership][.group] [file name] Change permission chmod [number or symbol] [file name] -rw-r-r--1nare 18722014-09-1712:57simplenote.c permissionlinkusergroupfile sizedatetimefile name Symbol uownership+add permission ggroup-del permission oothers=only permission aallsfile owned user
13
USER IDs Change shell user login shell
14
USER IDs Locked
15
HACKING.h Making header file Easy to use function
16
NOTETAKER.c
17
IMPLEMENT NOTETAKER.c User id
18
NOTESEARCH.c
21
IMPLEMENT NOTESEARCH.c Independent
22
TIME_EXAMPLE.C
23
TIME_EXAMPLE2.C
24
IMPLEMENT TIME_EXAMPLE2.C
25
FUNCTION POINTER.C
26
RAND_EXAMPLE.C
27
Different
28
GAME OF CHANCE.C
39
PLAY‘GAME OF CHANCE’ I didn’t win the game. T_T
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.