Skip to content

This is a demonstration of how to perform a return-to-libc attack on a buffer-overflow vulnerable program.

Notifications You must be signed in to change notification settings

allenwest24/Return-to-libc-demo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Contents:

  • findEnv.c: Finds the address for '/bin/sh' which we stored as an environment variable.
  • exploit: Exploit for the return-to-libc
  • exploit2: Exploit for the return-to-libc with setuid.
  • retlib.c: The buffer overflow vulnerable code we are designing the exploits for.
  • report: This is the report for the lab with proof-of-concepts and screenshots.

About

This is a demonstration of how to perform a return-to-libc attack on a buffer-overflow vulnerable program.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published