목록System hacking 16
strangerRidingCaml
Stack Pivot Exploits Lab In this lab, we will implement stack pivot techniques for stack manipulation. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_functionchar∗input { char buffer[64]; strcpybuffer,input; } int mainintargc,char∗argv[] { i..
Return-to-dl-resolve Attacks Lab In this lab, we will leverage return-to-dl-resolve for dynamic linker exploitation. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_functionchar∗input { char buffer[64]; strcpybuffer,input; } int main(int argc, char *ar..
Return-to-CSU __libc_csu_init Exploits Lab In this lab, we will exploit __libc_csu_init for arbitrary code execution. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_functionchar∗input { char buffer[64]; strcpybuffer,input; } int main(int argc, char ..
Jump-Oriented Programming JOP Lab In this lab, we will construct JOP chains for code execution. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_functionchar∗input { char buffer[64]; strcpybuffer,input; } int mainintargc,char∗argv[] { if (ar..
Heap Feng Shui Exploitation Lab In this lab, we will craft heap layouts to exploit memory corruption vulnerabilities. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a memory corruption vulnerability. #include #include void vulnerable_function { char *ptr1 = char∗malloc64; char *ptr2 = char∗malloc64; if (ptr1..
Heap Spray Techniques Lab In this lab, we will manipulate the heap with heap spray techniques to facilitate exploitation. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with heap manipulation vulnerability. #include #include void vulnerable_function { char *ptr = char∗malloc64; if ptr!=NULL { // Simulate heap ..