- Read through the Buffer Overflow Demo pdf in this directory to orient yourself to these files and what they each do.
- These techniques start with a vulnerable program with a simple buffer overflow vulnerability due to the use of strcpy when reading a file into a buffer.
- We then introduce various system protections, such as address randomization, StackGuard, and Non-executable stacks, and how to get around some of them.
- How to create a NOP sled.
- Use GDB to locate addresses we need.
- Follow-on to this demo will be in my Return-to-libc demo.
-
Notifications
You must be signed in to change notification settings - Fork 0
allenwest24/Buffer-Overflow-Demo
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
This is a walkthrough for buffer overflows, slowly adding common defenses and altering our exploit to get around them.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published