Unit Description
Topics covered
- Function calling conventions:
cdecl
andSYSV
- Stack buffer overflow vulnerabilities and exploitation techniques
- Return address manipulation using buffer overflow
- Exploit execution and vulnerability patching
Who should take this unit
- Individuals interested in system hacking and security vulnerabilities
- Those looking to understand low-level programming and exploit development
Prerequisite knowledge
- Basic understanding of computer architecture and memory management
- Familiarity with C/C++ programming and assembly language
Environment
- Linux environment based on x86-64 architecture (Ubuntu 22.04)
Objectives
Calling Convention
Background: Calling Convention
Quiz: Calling Convention
Stack Buffer Overflow
Memory Corruption: Stack Buffer Overflow
Lab: Stack Buffer Overflow - Auth Overwrite
Lab: Stack Buffer Overflow - Memory Leak
Lab: Stack Buffer Overflow - Change Control Flow
[Exercise] Stack Buffer Overflow
Exploit Tech: Return Address Overwrite
Return Address Overwrite
[Exercise] Stack Buffer Overflow - 2
Exercise: basic_exploitation_001
Exercise: basic_exploitation_000
basic_exploitation_000
basic_exploitation_001
Rating
All items must be completed before leaving a rating feedback.
Stack Buffer Overflow
When you sign up
Free
0% Completed
Total 0 completed
Lecture
0 /5
Wargame
0 /3
3
Quiz
0 /1
1