Skip to content

Secgroup Ca' Foscari

  • Home
  • Projects
  • Teaching
  • Competitions
  • People
  • Blog
  • Privacy Policy
  • Copyright
Secgroup Ca' Foscari

Lab: Buffer Overflow

In this lab we experiment with buffer overflow vulnerabilities.

Buffer overflow exploitation is an offensive technique. Trying it on real systems is against law and you might be prosecuted. Always do experiments with test hosts and users.

  • Prerequisites
  • Task 1: off-by-one
  • Task 2: stack protector
  • Task 3: address randomization
  • Task 4: password bypass

Menu

  • Home
  • Projects
  • Teaching
    • Cryptography
    • System Security
      • Lab: Cryptography
      • Lab: Password Cracking
      • Lab: Unix/Linux Access Control
      • Lab: SQL injection
      • Lab: Software Security
      • Lab: Security APIs
      • Lab: Formal Verification
      • Lab: Side Channels
      • Old labs
        • Lab: Buffer Overflow
          • Overflow Lab: prerequisites
          • Task 1: off-by-one
          • Task 2: stack protector
          • Task 3: address randomization
          • Task 4: password bypass
    • Security 2
    • Sicurezza
    • Sistemi Operativi 2
    • Security 1 (until aa. 2021/22)
    • How to post source code
    • Linux VM with docker
  • Competitions
  • People
  • Blog
  • Privacy Policy
  • Copyright

Recent Posts

  • CyberChallenge.IT, register by February 6!
  • How secure is HTTPS?
  • New attacks on crypto tokens
  • Clipperz seminar @ secgroup
  • DEFCON CTF 2015 hackercalc exploit

Search

Login

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • Home
  • Projects
  • Teaching
  • Competitions
  • People
  • Blog
  • Privacy Policy
  • Copyright
Secgroup Ca' Foscari Privacy Policy Proudly powered by WordPress