Загрузка страницы

SEED Labs: Buffer Overflow Attack (Level 1)

SEED Labs: Buffer Overflow Attack (Level 1)
Task 3: Launching Attack on 32-bit Program (Level 1)
---

//Commands//
*** Disable countermeasure:
$ sudo sysctl -w kernel.randomize_va_space=0
$ sudo ln -sf /bin/zsh /bin/sh

*** Compile:
$ make

*** Debug:
$ touch badfile
$ gdb stack-L1-dbg

gdb-peda$ b bof
gdb-peda$ run
gdb-peda$ next
gdb-peda$ p $ebp
gdb-peda$ p &buffer
gdb-peda$ p/d 0x0000 - 0x0000
gdb-peda$ quit

*** Edit exploit.py:
$ gedit exploit.py
(save)

*** Create badfile and launch attack
$ ./exploit.py
$ ./stack-L1

-------------------------------
Lab website: https://seedsecuritylabs.org/labsetup...
SEED Lab's are created by Dr. Wenliang Du and all labs are publicly available (https://seedsecuritylabs.org/index.html).
This video is posted under fair usage policy.

#seedvm #seed #seedlabs #seedlab #linux #ubuntu #ubuntu20 #install #tutorial #profsadat
@ProfSadat

Видео SEED Labs: Buffer Overflow Attack (Level 1) канала Professor Sadat
Страницу в закладки Мои закладки
Все заметки Новая заметка Страницу в заметки