2018-2019-1 20165334 "Fundamentals of Information Security system Design" Third week study summary and Buffer Overflow Vulnerability experiment One, instruction learning
gcc -Og -o xxx.c learns to
-Og tell the compiler to use an optimization level that generates machine code that conforms to the overall structure of the original C language code.
gcc -Og -S xxx.cLearning (
-S option to view compiled code generated by the C language compiler)
gcc -Og -c learn (can produce binary files) (disassembly
objdump -d xxx.o , can produce a format similar to assembly code)
Second, buffer overflow Vulnerability Experiment 1, the experimental environment configuration encountered problems. sudo apt-get install -y lib32z1 libc6-dev-i386The problem is encountered during installation
Workaround:
The command in the input diagram forces the unlock.
$ sudo apt-get install -y lib32readline-gplv2-devproblems during installation
Workaround:
will be lib32readline replaced lib32readline6 .
linux32encounter problems when entering.
An estimate may be an input format issue that has not been resolved to date. Excuse me... So I had to go to the experimental building, the whole process like open hanging, completed the experiment.
Experimental key steps
2018-2019-1 20165334 "Fundamentals of Information Security system Design" Third week study summary and Buffer Overflow Vulnerability experiment