Skip to content

Latest commit

 

History

History
10 lines (10 loc) · 956 Bytes

README.md

File metadata and controls

10 lines (10 loc) · 956 Bytes

lab1-CMSC426-CmpSec

Description

Lab 1 focused on the execution of a buffer overflow attack variant known as 'Return-to-libc'.
This lab was introductory in that Address Space Layout Randomization, StackGuard Protection, and the non-executable stack setting were all disabled for the duration of this lab, as described in "return_to_libc_official.pdf".

Repo Contents

  • "Lab 1 - Group 10 - Fall 2021 - CMSC 426.pdf" : This pdf must contain the answers to the professors questions found in return_to_libc_official.pdf.
  • "README.md"
  • "exploit.py" : The locations of the override instructions are adjusted here. When run, the file "badfile" is generated and contains the attack string loaded by retlib.c
  • "retlib.c" : This file imports the attack string, generated by exploit.py, and overwrites the buffer with the attack string.
  • "return_to_libc_official.pdf" : This filed contains the professors requirements for lab1.