An open API service indexing awesome lists of open source software.

https://github.com/pikulet/mem-attacks-example

Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
https://github.com/pikulet/mem-attacks-example

binary-exploitation buffer-overflow-attack format-string-attack return-oriented-programming

Last synced: 5 months ago
JSON representation

Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String

Awesome Lists containing this project

README

          

# mem-attacks-example
Examples of Binary Exploitations

- Buffer Overflow
- Format String
- Return-Oriented Programming

Not intended to be a teaching guide.

Pre-requisites:

The basic techniques of binary exploitation, namely overwriting variables/ return addresses.

This repository was tested on Ubuntu 16.04

General Tips:
- Install `peda`, which is a much more bazinga-ed version of gdb
- For format string attack, read documentation on `printf` calling conventions and how arguments are passed to functions for your machine (registers or stack).