Lab - Buffer Overflow Attack Lab
Lab Description and Tasks
- Lab Description: Buffer Overflow.pdf
- The BUF SIZE value for Task 3 (L1) is: 180.
- Tasks 5 & 6 are optional and for extra credit. Rest of the tasks are required.
- Lab Setup files: Labsetup.zip
- Additional information on the SEED project site.
-
Smashing The Stack For Fun And Profit, Aleph One
- Alternative to create badfile: exploit.c
- NOP - No Operation
Tips
- The following command can be used to link
/bin/shto/bin/zsh:sudo ln -sf /bin/zsh /bin/sh - To turn off address randomization:
$ sudo sysctl -w kernel.randomize_va_space=0 - Check the current randomization status:
$ sudo sysctl kernel.randomize_va_space - If you forget to turn off the non-executable stack protection
-z execstackyou will get a Segmentation fault - Use
-fno-stack-protectorto turn off the StackGuard
- To unconditionally make all targets:
make -B - Now you can debug
stack-L1-dbgto find the address ofbufferand frame pointer($ebp)- Start debugging by:
gdb stack-L1-dbg - To place a breakpoint at bof:
b bof - To run the program type:
r - To get address of buffer:
p &buffer - Address of the frame pointer:
p $ebp - To find the offset: use
pto substract the two, ex:p (0xbfffeb08 - 0xbfffeae8) - You can exit gdb debugging session by typing
quit
- Start debugging by:
touch badfilewill create an emptybadfile
Grading
Post your report in Marmoset by the scheduled due date in the syllabus. Your grade for this lab will be composed of:
- 30% - Design
- 30% - Observations
- 40% - Explanation
- Extra Credit if you pursue further investigation, beyond what is required by the lab description.
<!–
1 Familiar with Shell 5 2 Vulnerable program 5 3 Level 1 on 32 bit 30 4 Level 2 on 32 bit 30 7 dash countermeasures 15 8 ASLR 7.5 9 Other Protections 7.5
->
