In this lab we experiment with stack protector. In particular we will investigate the canary mechanism pointing out that its secrecy is a necessary prerequisite for security.
Buffer overflow exploitation is an offensive technique. Trying it on real systems is against law and you might be prosecuted. Always do experiments with test hosts and users.