Lab 5: Attack

Introduction

In this lab, you will be attacking programs by causing buffer overflows! Similar to the Bomb lab, each team will have their own targets to use.

Getting Started

You'll again be downloading your custom target using links. To obtain your team's target, one (and only one) of the team members should follow these steps:

  1. Connect to wilkes (e.g., using VS Code) and open a terminal
  2. Create a directory for your lab files (e.g., using the command mkdir lab5), and enter that directory (e.g., using cd lab5).
  3. Enter the command links http://wilkes:15513
  4. Follow the prompts to download your target, and hit the 'q' key to exit links when you're done

(If you want more of a step-by-step guide to using links, refer back to the bomb lab page).

The lab setup and requirements can found be found in this writeup.

Due Date and Submission

Due: Friday November 8th, 9:35am.

As mentioned in the writeup, you'll be writing three exploit strings (in hex) for the three phases of the lab. To submit:
  1. Place each string in a separate .txt file and name these ctarget.1.txt, ctarget.2.txt, and rtarget.3.txt for phases 1, 2, and 3 respectively.
  2. Put all three txt files into a new folder called lab05
  3. Compress the directory using the following command: tar -czvf lab05.tar lab05
  4. Finally, submit the compressed directory with the following line: cs105submit -a 05 lab05.tar