Skip to content

Practical Activities

This week we are going to be looking at buffer overflows.

Its a pretty complex thing, so dont worry if you struggle. The tasks are not essential for the courework, (but its a really good idea to have some understanding of what is going on)

!!! question "Question #unsmashable

Work through the theory materials on stack organisation, and answer
the following question.

What kinds of stack protection are there? Is there such a thing as an 
unsmashable stack?

Redirecting Program flow

Work through the example on redirecting program flow Try to smash the stack using the example program.

Once you have completed the task, recompile with a different sized buffer Can you recreate the attack with different parameters

Smashing the stack for fun and profit

Work throught the stack smashing example to drop a shell

Can you crereate the attack with different parameters

Foreshadowing Next Week

Our POC attack has some flaws, we need to be on a system with a debugger to get the address we are jumping to.

Is there any way we can get the system to calulcate this address for us?

Post on aula with the tag #locatingAddress

Back to top