Lesson 19: The Best Defense is a Good Offense
Outline:
- Buffer overflow attacks
- how they occur
- how we can prevent them
- example:
attack.c
- Assignment #6 Overview
- Supply chain attacks
- interlude: quines
- Trusting Trust (by Ken Thompson)
- SolarWinds attack
Reading assignment (to be completed by the next class):
- Assignment 6: Exploiting Buffer Overflows – read it and try to run
ctargetonmantis! - Unix:
- command line: Dive Into Systems, Sec. 17.1
- I/O redirection: Dive Into Systems, Sec. 17.12
- pipes: Dive Into Systems, Sec. 17.13