목록System hacking (16)
strangerRidingCaml
Frame Faking and Fake EBP Lab In this lab, we will learn how to manipulate stack frames and EBP for privilege escalation. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(int argc, cha..
Return-to-Libc (RTL) Exploits Lab In this lab, we will learn how to craft RTL exploits to bypass ASLR and DEP protections. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(int argc, ch..
Return-to-Shellcode Attacks Lab In this lab, we will learn how to exploit buffer overflow vulnerabilities to redirect program execution to injected shellcode. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffe..
Shellcode Development Lab In this lab, we will learn how to write and execute custom shellcode for basic commands. Lab Activities: 1. Writing Custom Shellcode: To begin, let's create a simple C program that executes a basic shell command. #include #include int main() { system("/bin/bash"); return 0; } Save the above code to a file named shell.c and compile it: $ gcc -o ..