Professional Documents
Culture Documents
Exploits
subtitle: week 7
Peter Jamieson
Miami University
Today
The machine and C
Computer engineers
Who the experts are hackers
Virus
Smash the stack
Compiling
What happens?
objdump -d program.o
shows the assembly instructions beside the
machine code
objdump -d program.exe
Linker adds some steps
Other tools
readelf -h program.exe
readelf -S program.exe
Compare what we learned with gdb
What is?
A virus
A trojan horse
A worm
What is?
A virus = program that attaches to exe and
replicates in other exes unknowingly, but
program with virus must run
A trojan horse = looks like legit software but
you click to run
A worm = like a virus, but some data transfers
it and then it replicates
How do we stop?
Thoughts?
Details:
https://www.youtube.com/watch?v=1S0aBV-Waeo
Smash stack
Almost all computer exploits look for memory
copies that can be overflowed to hit the return
address and then run your code
How can I write code without compiling in this
exploit?
Think login
Challenge
Given PROGRAM_26
Add a printf statement
Answer the following