In rtarget Phase 3 of Attack Lab [Updated 1/11/16], which involving a code injection attack, if some of students want to use a return address containing 0x0a
in their target injection codes, then getbuf()
may parse 0x0a
as newline
which leads to termination of the injection codes behind. Since each students in CMU has their only attack targets which are built automatically, if some of the targets are built with address in gadgets farm they need containing 0x0a
, it will unfortunately stop students from implementing injection attacks.
-
My injection attacks solution in asm code
movq %rsp, %rax