Unit Description
Explore stack buffer overflow vulnerabilities.
Objectives

Topics Covered

  • Function calling conventions: cdecl and SYSV
  • Stack buffer overflow vulnerabilities and exploitation techniques
  • Return address manipulation using buffer overflow
  • Exploit execution and vulnerability patching

Recommended For

  • Individuals interested in system hacking and security vulnerabilities
  • Those looking to understand low-level programming and exploit development

Prerequisite Knowledge

  • Basic understanding of computer architecture and memory management
  • Familiarity with C/C++ programming and assembly language

Environment

  • Linux environment based on x86-64 architecture (Ubuntu 22.04)
Composition
Stack Buffer Overflow
Memory Corruption: Stack Buffer Overflow
Lab: Stack Buffer Overflow - Auth Overwrite
Pro
Lab: Stack Buffer Overflow - Memory Leak
Pro
Lab: Stack Buffer Overflow - Change Control Flow
Pro
[Exercise] Stack Buffer Overflow
Exploit Tech: Return Address Overwrite
Return Address Overwrite
[Exercise] Stack Buffer Overflow - 2
Exercise: basic_exploitation_001
Exercise: basic_exploitation_000
basic_exploitation_000
basic_exploitation_001
Rating
9.9 (63)
0
All items must be completed before leaving a rating feedback.
Stack Buffer Overflow
9.9
(63)
Tier 0 Medium
When you sign up
Free
0% Completed Total 0 completed
Lecture 0 /4
Excluded
Wargame 0 /3
3
You can access locked objectives by upgrading your plan or purchasing the units separately.