信息安全
文章平均质量分 96
Thare_Lam
Hello World。
展开
专栏收录文章
- 默认排序
- 最新发布
- 最早发布
- 最多阅读
- 最少阅读
-
Lab2 Return-To-Libc
Lab OverviewIn this lab, you’ll explore how to defeat the protection mechanisms introduced to counter buffer overflows. The first type of countermeasure is nonexecutable stack, which will mark the sta原创 2015-11-08 10:05:33 · 1329 阅读 · 0 评论 -
Lab1 Buffer OverFlow
Lab OverViewImportant Note: This course’s labs, including this lab, ask you to design exploits and to perform attacks. These exploits and attacks are realistic enough that you might be able to use them原创 2015-11-08 09:44:10 · 1541 阅读 · 0 评论 -
Lab3 Privilege Separation
Lab OverviewIn this lab, you’ll explore privilege separation. The key insight of privilege separation is to give minimal privilege to each component of a system, so that when one component of the syste原创 2015-11-17 22:24:04 · 1178 阅读 · 1 评论 -
Lab4 Authentication
Lab OverviewIn this lab, you’ll explore authentication. The key problem that authentication addresses is that how to identify the identity of a user. Think online banking system, on which many users ar原创 2015-12-11 21:47:56 · 1604 阅读 · 2 评论
分享