Skip to content

This lab required the execution of a buffer-overflow attack variant, known as return-to-libc, bypassing existing protection schemes implemented in Linux OS.

Notifications You must be signed in to change notification settings

kbmclaren/lab1-CMSC426-CmpSec

Repository files navigation

lab1-CMSC426-CmpSec

Description

Lab 1 focused on the execution of a buffer overflow attack variant known as 'Return-to-libc'.
This lab was introductory in that Address Space Layout Randomization, StackGuard Protection, and the non-executable stack setting were all disabled for the duration of this lab, as described in "return_to_libc_official.pdf".

Repo Contents

  • "Lab 1 - Group 10 - Fall 2021 - CMSC 426.pdf" : This pdf must contain the answers to the professors questions found in return_to_libc_official.pdf.
  • "README.md"
  • "exploit.py" : The locations of the override instructions are adjusted here. When run, the file "badfile" is generated and contains the attack string loaded by retlib.c
  • "retlib.c" : This file imports the attack string, generated by exploit.py, and overwrites the buffer with the attack string.
  • "return_to_libc_official.pdf" : This filed contains the professors requirements for lab1.

About

This lab required the execution of a buffer-overflow attack variant, known as return-to-libc, bypassing existing protection schemes implemented in Linux OS.

Topics

Resources

Stars

Watchers

Forks