2018-2019-1 20165334 "Fundamentals of Information Security system Design" Third week study summary and Buffer Overflow Vulnerability experiment One, instruction learning
gcc -Og -o xxx.c
learns to
-Og
tell the compiler to use an optimization level that generates machine code that conforms to the overall structure of the original C language code.
gcc -Og -S xxx.c
Learning (
-S
option to view compiled code generated by the C language compiler)
gcc -Og -c
learn (can produce binary files) (disassembly
objdump -d xxx.o
, can produce a format similar to assembly code)
Second, buffer overflow Vulnerability Experiment 1, the experimental environment configuration encountered problems. sudo apt-get install -y lib32z1 libc6-dev-i386
The problem is encountered during installation
Workaround:
The command in the input diagram forces the unlock.
$ sudo apt-get install -y lib32readline-gplv2-dev
problems during installation
Workaround:
will be lib32readline
replaced lib32readline6
.
linux32
encounter problems when entering.
An estimate may be an input format issue that has not been resolved to date. Excuse me... So I had to go to the experimental building, the whole process like open hanging, completed the experiment.
Experimental key steps
2018-2019-1 20165334 "Fundamentals of Information Security system Design" Third week study summary and Buffer Overflow Vulnerability experiment