목록전체 글 (110)
strangerRidingCaml
Stack Pivot Exploits Lab In this lab, we will implement stack pivot techniques for stack manipulation. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(int argc, char *argv[]) { i..
Return-to-dl-resolve Attacks Lab In this lab, we will leverage return-to-dl-resolve for dynamic linker exploitation. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(int argc, char *ar..
Return-to-CSU (__libc_csu_init) Exploits Lab In this lab, we will exploit __libc_csu_init for arbitrary code execution. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(int argc, char ..
Jump-Oriented Programming (JOP) Lab In this lab, we will construct JOP chains for code execution. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(int argc, char *argv[]) { if (ar..
Heap Feng Shui Exploitation Lab In this lab, we will craft heap layouts to exploit memory corruption vulnerabilities. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a memory corruption vulnerability. #include #include void vulnerable_function() { char *ptr1 = (char *)malloc(64); char *ptr2 = (char *)malloc(64); if (ptr1..
Heap Spray Techniques Lab In this lab, we will manipulate the heap with heap spray techniques to facilitate exploitation. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with heap manipulation vulnerability. #include #include void vulnerable_function() { char *ptr = (char *)malloc(64); if (ptr != NULL) { // Simulate heap ..