--- a/handouts/ho03.tex Thu Nov 06 12:32:05 2014 +0000
+++ b/handouts/ho03.tex Thu Nov 06 17:41:55 2014 +0000
@@ -487,13 +487,15 @@
amount of time. If we now use an address that lets us jump to
any address in the grey area we are done. The target machine
will execute these \pcode{NOP} operations until it reaches the
-shellcode. A moment of thought should convince you that this
-trick can hugely improve our odds of finding the right
-address---depending on the size of the buffer, it might only
-take a few tries to get the shellcode to run. And then we are
-in. The code for such an attack is shown in Figure~\ref{C3}.
-It is directly taken from the original paper about ``Smashing
-the Stack for Fun and Profit'' (see pointer given at the end).
+shellcode. That is why this NOP-part is often called
+\emph{NOP-sledge}. A moment of thought should convince you
+that this trick can hugely improve our odds of finding the
+right address---depending on the size of the buffer, it might
+only take a few tries to get the shellcode to run. And then we
+are in. The code for such an attack is shown in
+Figure~\ref{C3}. It is directly taken from the original paper
+about ``Smashing the Stack for Fun and Profit'' (see pointer
+given at the end).
\begin{figure}[p]
\lstinputlisting[language=C]{../progs/C3.c}