mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-22 02:43:02 +00:00
Update README.md
This commit is contained in:
parent
34e86d5ce6
commit
d0fd618943
1 changed files with 13 additions and 0 deletions
|
@ -29,3 +29,16 @@ int main()
|
||||||
```
|
```
|
||||||
|
|
||||||
The `char buffer[20];` is a really bad idea. The rest will be demonstrated in the course.
|
The `char buffer[20];` is a really bad idea. The rest will be demonstrated in the course.
|
||||||
|
|
||||||
|
You can compile this code or use the already-compiled binary [here](https://github.com/The-Art-of-Hacking/h4cker/raw/master/buffer_overflow_example/vuln_program).
|
||||||
|
|
||||||
|
For 32 bit systems you can use [gcc](https://www.gnu.org/software/gcc/) as shown below:
|
||||||
|
```
|
||||||
|
gcc vuln.c -o vuln -fno-stack-protector
|
||||||
|
```
|
||||||
|
For 64 bit systems
|
||||||
|
|
||||||
|
```
|
||||||
|
gcc vuln.c -o vuln -fno-stack-protector -m32
|
||||||
|
```
|
||||||
|
`-fno-stack-protector` disabled the stack protection. Smashing the stack is now allowed. `-m32` made sure that the compiled binary is 32 bit. You may need to install some additional libraries to compile 32 bit binaries on 64 bit machines.
|
||||||
|
|
Loading…
Reference in a new issue