Attack Lab

Azusagawa Sakuta

Attack Lab

Use gdb to get the stack pointer (%rsp)
Use regex and translate all possible mov / pop / nop / equal nop instructions
When using ROP attack, we should always remember that we did not use any call functions (cuz it’s hard to find offset), but the ret instruction will return to the address of what popped from stack.

It may help you in finding assembly gadget in farmer.asm

  • Title: Attack Lab
  • Author: Azusagawa Sakuta
  • Created at : 2026-05-14 10:56:00
  • Updated at : 2026-05-14 16:28:57
  • Link: https://azusagawa-sakuta.github.io/project/codes/Courses/CSAPP/AttackLab/
  • License: This work is licensed under CC BY-NC-SA 4.0.
Comments
On this page
Attack Lab