Spring Semester of sophomore year
For PPTs, check out here
- Microsoft Windows 10 Professional
- OllyDbg 1.10
- gcc version 4.9.2 (tdm64-1)
- Introduction to Buffer Overflows in C++ (Heap & Stack Explained)
- Running a Buffer Overflow Attack - Computerphile
- 《汇编语言(第四版) - 王爽》清华大学出版社
- 《0day安全:软件漏洞分析技术(第二版)》
- OllyDbg
- 010 Editer
- [the origin source code for Q3](./2_Vulnerabilities and exploitation of vulnerabilities/source.c)
- [compile the source code](./2_Vulnerabilities and exploitation of vulnerabilities/run_souce.sh)
- [skip the verification](./2_Vulnerabilities and exploitation of vulnerabilities/source_file_jump.c)
- [the password to skip the verification][./2_Vulnerabilities and exploitation of vulnerabilities/password_jump.txt]
- [compile the code to skip verification](./2_Vulnerabilities and exploitation of vulnerabilities/run_file.sh)
- [insert own code to call Message Box](./2_Vulnerabilities and exploitation of vulnerabilities/source_file_callMessageBox.c)
- [the password to insert code](./2_Vulnerabilities and exploitation of vulnerabilities/password_callMessageBox.txt)
- [compile the code to insert code](./2_Vulnerabilities and exploitation of vulnerabilities/run_file_callMessageBox.sh)