信息安全
文章平均质量分 96
Thare_Lam
Hello World。
展开
-
Lab2 Return-To-Libc
Lab OverviewIn this lab, you’ll explore how to defeat the protection mechanisms introduced to counter buffer overflows. The first type of countermeasure is nonexecutable stack, which will mark the sta原创 2015-11-08 10:05:33 · 1206 阅读 · 0 评论 -
Lab1 Buffer OverFlow
Lab OverViewImportant Note: This course’s labs, including this lab, ask you to design exploits and to perform attacks. These exploits and attacks are realistic enough that you might be able to use them原创 2015-11-08 09:44:10 · 1441 阅读 · 0 评论 -
Lab3 Privilege Separation
Lab OverviewIn this lab, you’ll explore privilege separation. The key insight of privilege separation is to give minimal privilege to each component of a system, so that when one component of the syste原创 2015-11-17 22:24:04 · 1085 阅读 · 1 评论 -
Lab4 Authentication
Lab OverviewIn this lab, you’ll explore authentication. The key problem that authentication addresses is that how to identify the identity of a user. Think online banking system, on which many users ar原创 2015-12-11 21:47:56 · 1510 阅读 · 2 评论