In this lab we experiment with buffer overflow vulnerabilities.
Buffer overflow exploitation is an offensive technique. Trying it on real systems is against law and you might be prosecuted. Always do experiments with test hosts and users.
- Prerequisites
- Task 1: off-by-one
- Task 2: stack protector
- Task 3: address randomization
- Task 4: password bypass