In this lab we experiment with buffer overflow vulnerabilities.
Buffer overflow exploitation is an offensive technique. Trying it on real systems is against law and you might be prosecuted. Always do experiments with test hosts and users.
NOTE: The last task is a simple challenge that will give you extra score once you solve it and submit a concise, clear and correct write-up (more detail in the task).
No hurry! You don’t need to complete the challenge by the end of the class! Take your time … deadline is 17 November 2022.
- Task 1: off-by-one
- Task 2: stack protector
- Task 3: address randomization
- Task 4: password bypass