Unit Description
Explore stack buffer overflow attacks, stack canaries, and techniques to bypass them.
Objectives
Topics Covered
- Principles of stack buffer overflows and stack canaries
- How canaries are generated and used for protection
- Techniques for bypassing canaries and injecting shellcode
- Bypassing the mitigation and writing exploits
Recommended For
- Individuals interested in system security and exploitation techniques
- Those looking to understand advanced attack and defense mechanisms
Prerequisite Knowledge
- Basic understanding of computer architecture and memory management
- Familiarity with programming languages like C/C++
Environment
- Linux environment based on x86-64 architecture (Ubuntu 22.04)
Composition
Stack Canary
Mitigation: Stack Canary
Lab: Stack Canary
Quiz: Stack Canary
[Exercise] Stack Canary
Exploit Tech: Return to Shellcode
Exercise: ssp_001
Return to Shellcode
ssp_001
Rating
All items must be completed before leaving a rating feedback.
Stack Canary
Retail Price
100 coins
When you subscribe
Free
0% Completed
Total 0 completed
Lecture
0 /3
Excluded
Wargame
0 /2
2
Quiz
0 /1
1