Unit Description

Topics covered

  • Function calling conventions: cdecl and SYSV
  • Stack buffer overflow vulnerabilities and exploitation techniques
  • Return address manipulation using buffer overflow
  • Exploit execution and vulnerability patching

Who should take this unit

  • Individuals interested in system hacking and security vulnerabilities
  • Those looking to understand low-level programming and exploit development

Prerequisite knowledge

  • Basic understanding of computer architecture and memory management
  • Familiarity with C/C++ programming and assembly language

Environment

  • Linux environment based on x86-64 architecture (Ubuntu 22.04)
Objectives
Calling Convention
Background: Calling Convention
Quiz: Calling Convention
Stack Buffer Overflow
Memory Corruption: Stack Buffer Overflow
Lab: Stack Buffer Overflow - Auth Overwrite
Pro
Lab: Stack Buffer Overflow - Memory Leak
Pro
Lab: Stack Buffer Overflow - Change Control Flow
Pro
[Exercise] Stack Buffer Overflow
Exploit Tech: Return Address Overwrite
Return Address Overwrite
[Exercise] Stack Buffer Overflow - 2
Exercise: basic_exploitation_001
Exercise: basic_exploitation_000
basic_exploitation_000
basic_exploitation_001
Rating
10.0 (1)
0
All items must be completed before leaving a rating feedback.
Stack Buffer Overflow
10 (1)
Tier 0 Medium
When you sign up
Free
0% Completed Total 0 completed
Lecture 0 /5
Wargame 0 /3
3
Quiz 0 /1
1
You can access locked objectives by upgrading your plan or purchasing the units separately.