- findEnv.c: Finds the address for '/bin/sh' which we stored as an environment variable.
- exploit: Exploit for the return-to-libc
- exploit2: Exploit for the return-to-libc with setuid.
- retlib.c: The buffer overflow vulnerable code we are designing the exploits for.
- report: This is the report for the lab with proof-of-concepts and screenshots.
-
Notifications
You must be signed in to change notification settings - Fork 0
allenwest24/Return-to-libc-demo
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
This is a demonstration of how to perform a return-to-libc attack on a buffer-overflow vulnerable program.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published