Advances in Computer Science

Spring Semester of sophomore year

For PPTs, check out here

Project 1

Project

Project 2

Environment

  1. Microsoft Windows 10 Professional
  2. OllyDbg 1.10
  3. gcc version 4.9.2 (tdm64-1)

Questions

Q3 - Modify adjacency variables

Reference linking
  1. Introduction to Buffer Overflows in C++ (Heap & Stack Explained)
  2. Running a Buffer Overflow Attack - Computerphile
  3. 《汇编语言(第四版) - 王爽》清华大学出版社
  4. 《0day安全:软件漏洞分析技术(第二版)》
Apps inneed
  1. OllyDbg
  2. 010 Editer
Files
  1. [the origin source code for Q3](./2_Vulnerabilities and exploitation of vulnerabilities/source.c)
  2. [compile the source code](./2_Vulnerabilities and exploitation of vulnerabilities/run_souce.sh)
  3. [skip the verification](./2_Vulnerabilities and exploitation of vulnerabilities/source_file_jump.c)
  4. [the password to skip the verification][./2_Vulnerabilities and exploitation of vulnerabilities/password_jump.txt]
  5. [compile the code to skip verification](./2_Vulnerabilities and exploitation of vulnerabilities/run_file.sh)
  6. [insert own code to call Message Box](./2_Vulnerabilities and exploitation of vulnerabilities/source_file_callMessageBox.c)
  7. [the password to insert code](./2_Vulnerabilities and exploitation of vulnerabilities/password_callMessageBox.txt)
  8. [compile the code to insert code](./2_Vulnerabilities and exploitation of vulnerabilities/run_file_callMessageBox.sh)