Lab: Stack protector

In this lab we experiment with stack protector. In particular we will investigate the canary mechanism pointing out that its secrecy is a necessary prerequisite for security.

Buffer overflow exploitation is an offensive technique. Trying it on real systems is against law and you might be prosecuted. Always do experiments with test hosts and users.

  • Prerequisites: all tasks should be solved using testbed
  • Task 1: Canary at work
  • Task 2: Find the canary with gdb
  • Task 3: Manually leak the canary
  • Task 4: Overwrite the canary