Skip to content

Latest commit

 

History

History
21 lines (12 loc) · 557 Bytes

README.md

File metadata and controls

21 lines (12 loc) · 557 Bytes

mem-attacks-example

Examples of Binary Exploitations

  • Buffer Overflow
  • Format String
  • Return-Oriented Programming

Not intended to be a teaching guide.

Pre-requisites:

The basic techniques of binary exploitation, namely overwriting variables/ return addresses.

This repository was tested on Ubuntu 16.04

General Tips:

  • Install peda, which is a much more bazinga-ed version of gdb
  • For format string attack, read documentation on printf calling conventions and how arguments are passed to functions for your machine (registers or stack).