목록전체 글 (110)
strangerRidingCaml
One-Gadgets with PLT/GOT Overwrite Lab In this lab, we will leverage one-gadgets to exploit binary vulnerabilities. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(int argc, char *arg..
Race Condition Exploits Lab In this lab, we will simulate race condition exploits in multithreaded applications. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a race condition vulnerability. #include #include #include int global_variable = 0; void *thread_function(void *arg) { int *increment = (int *)arg; global_variable..
Blind Return-Oriented Programming (BROP) Lab In this lab, we will learn how to create BROP payloads to exploit blind vulnerabilities. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(i..
Sigreturn-Oriented Programming (SROP) Lab In this lab, we will learn how to develop SROP exploits for sandbox escape. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a syscall instruction. #include #include int main() { char buf[10]; read(0, buf, 100); // Vulnerable syscall return 0; } Save the above code to a file ..
Return-Oriented Programming (ROP) Lab In this lab, we will learn how to build ROP chains to execute arbitrary code sequences. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(int argc,..
Frame Pointer Overwrite Attacks Lab In this lab, we will learn how to exploit vulnerabilities to overwrite frame pointers and gain control of program flow. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, ..