{"id":15586881,"url":"https://github.com/art049/simple-buffer-overflow-server","last_synced_at":"2026-01-07T16:47:27.454Z","repository":{"id":114000751,"uuid":"81039726","full_name":"art049/simple-buffer-overflow-server","owner":"art049","description":"Challenge/Tutorial aiming to exploit the buffer overflow vulnerability w/ Metasploit plugin implementation","archived":false,"fork":false,"pushed_at":"2019-10-06T09:24:40.000Z","size":9,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":2,"default_branch":"master","last_synced_at":"2025-02-03T23:49:14.365Z","etag":null,"topics":["buffer-overflow-vulnerability","challenge","metasploit","security","tutorial"],"latest_commit_sha":null,"homepage":"","language":"Makefile","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/art049.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2017-02-06T02:25:54.000Z","updated_at":"2019-10-06T09:36:53.000Z","dependencies_parsed_at":null,"dependency_job_id":"ce51a66d-895b-4217-b969-efbdda60adfc","html_url":"https://github.com/art049/simple-buffer-overflow-server","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/art049%2Fsimple-buffer-overflow-server","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/art049%2Fsimple-buffer-overflow-server/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/art049%2Fsimple-buffer-overflow-server/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/art049%2Fsimple-buffer-overflow-server/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/art049","download_url":"https://codeload.github.com/art049/simple-buffer-overflow-server/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246162147,"owners_count":20733357,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["buffer-overflow-vulnerability","challenge","metasploit","security","tutorial"],"created_at":"2024-10-02T21:41:40.221Z","updated_at":"2026-01-07T16:47:22.434Z","avatar_url":"https://github.com/art049.png","language":"Makefile","readme":"# Simple **stack buffer overflow** server\n\nThis simple C program (`main.c`) expose a stack injection vulnerablity. This program can also be run as a TCP server using the `make serve_vulnerability` command.\n\n## Goal\nThe main goal of this challenge is to run arbitrary code (a shellcode f.e) on the server's host machine exploiting the stack buffer overflow vulnerability. \n\nA further goal is to write a Metasploit exploit to automate the vulnerability exploitation.\n\n## Useful ressources\n- [Stack buffer overflow (Wikipedia)](https://en.wikipedia.org/wiki/Stack_buffer_overflow)\n- [Buffer overflow exploit](https://dhavalkapil.com/blogs/Buffer-Overflow-Exploit/)\n- [Classic Buffer overflow exploits on Linux x64](http://www.madhur.co.in/blog/2011/08/04/exploitdevlinux.html)\n- [Protections against buffer overflow exploits in Linux](http://www.madhur.co.in/blog/2011/08/06/protbufferoverflow.html)\n- [Generating Alphanumeric Shellcode with Metasploit](https://www.offensive-security.com/metasploit-unleashed/alphanumeric-shellcode/)\n- [Writing an exploit for Metasploit](https://www.offensive-security.com/metasploit-unleashed/writing-an-exploit/)\n\n\n\n### [Solution](./solution/solution.md)","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fart049%2Fsimple-buffer-overflow-server","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fart049%2Fsimple-buffer-overflow-server","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fart049%2Fsimple-buffer-overflow-server/lists"}