https://github.com/pikulet/mem-attacks-example
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
https://github.com/pikulet/mem-attacks-example
binary-exploitation buffer-overflow-attack format-string-attack return-oriented-programming
Last synced: 5 months ago
JSON representation
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
- Host: GitHub
- URL: https://github.com/pikulet/mem-attacks-example
- Owner: pikulet
- License: mit
- Created: 2020-09-29T21:27:27.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2022-10-27T07:00:10.000Z (about 3 years ago)
- Last Synced: 2025-04-28T13:54:50.337Z (8 months ago)
- Topics: binary-exploitation, buffer-overflow-attack, format-string-attack, return-oriented-programming
- Language: Python
- Homepage:
- Size: 334 KB
- Stars: 8
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# mem-attacks-example
Examples of Binary Exploitations
- Buffer Overflow
- Format String
- Return-Oriented Programming
Not intended to be a teaching guide.
Pre-requisites:
The basic techniques of binary exploitation, namely overwriting variables/ return addresses.
This repository was tested on Ubuntu 16.04
General Tips:
- Install `peda`, which is a much more bazinga-ed version of gdb
- For format string attack, read documentation on `printf` calling conventions and how arguments are passed to functions for your machine (registers or stack).