This preview shows page 1. Sign up to view the full content.
Unformatted text preview: 14. debug using gdb gdb ./thttpd 5942 15. repeat step 12 to crash the server again 16. backtrace backtrace ======================================================================== To exploit a system by using stack overflows, the hacker could simply insert a large amount of NOP instructinos into the system's stack. Since a function's return address is stored at one end of the stack, when the stack has been filled to a point where the stack pointer is now pointing at the end of the allocated stack frame (aka stack overflow), the hacker could then change the return address of the program to a different address (where his own code is at). When the function returns, the system will excecute the malicious code that the hacker has put onto the machine, and thus grants the hacker system control....
View Full Document
This note was uploaded on 06/02/2009 for the course CS 35L taught by Professor Eggert during the Spring '09 term at UCLA.
- Spring '09