In this lab, we will experiment with the stack protector, specifically investigating the canary mechanism and highlighting that maintaining its secrecy is a necessary prerequisite for ensuring security
Buffer overflow exploitation is an offensive technique. Trying it on real systems is against law and you might be prosecuted. Always do experiments with test hosts and users.