Lab: Stack protector

In this lab, we will experiment with the stack protector, specifically investigating the canary mechanism and highlighting that maintaining its secrecy is a necessary prerequisite for ensuring security

Buffer overflow exploitation is an offensive technique. Trying it on real systems is against law and you might be prosecuted. Always do experiments with test hosts and users.

  • Prerequisites: all tasks should be solved using testbed
  • Task 1: Canary at work
  • Task 2: Find the canary with gdb
  • Task 3: Manually leak the canary
  • Task 4: Overwrite the canary