Linux Binary Exploitation
-
Updated
Jun 15, 2021 - C
Linux Binary Exploitation
ROPfuscator is a fine-grained code obfuscation framework for C/C programs using ROP (return-oriented programming).
........... The projects and homeworks are part of the course CSE-565 : Computer Security [Fall 2018 @ UB_SUNY]................ Course Instructor : Marina Blanton (http://www.acsu.buffalo.edu/~mblanton/)
Attaque informatique par un dépassement de tampon dans lequel l'adresse de retour dans la pile est remplacée par l'adresse d'une autre fonction et une seconde partie de la pile est modifiée pour fournir les paramètres à cette fonction.
This lab required the execution of a buffer-overflow attack variant, known as return-to-libc, bypassing existing protection schemes implemented in Linux OS.
Scripts used for the Software systems exploitation course
A short C program that illustrates a return-to-lib buffer overflow attack
Return-to-libc buffer overflow attack.
단국대학교 운영체제보안 과제
Add a description, image, and links to the return-to-libc topic page so that developers can more easily learn about it.
To associate your repository with the return-to-libc topic, visit your repo's landing page and select "manage topics."