You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This project contains several attack scenarios that demonstrate various ways of abusing buffer overflow vulnerabilities on an x86 architecture.
The provided scenarios are:
Classic buffer overflow exploit with shellcode
Abusing previous function stack frames
Abusing C++ virtual table pointers
Return-to-Libc attack
Bypassing ASLR by leaking GOT addresses
Active protection measures for each of these scenarios are:
scenario
canary
NX
ASLR
1
2
x
3
x
4
x
5
x
x*
* target program is compiled without PIE
Usage
To set up the scenarios and start the VM, from the project root run:
vagrant up
vagrant ssh
After that, the exploits can be executed from each scenario's folder using the provided exploit_p$NUM.sh scripts.
Turning ASLR on/off
Since ASLR is implemented at the kernel level, the provided VM starts out without that feature enabled. To turn it on for the last scenario, run the following command:
echo 0 | sudo tee /proc/sys/kernel/randomize_va_space
0 commit comments