Examples of Binary Exploitations
- Buffer Overflow
- Format String
- Return-Oriented Programming
Not intended to be a teaching guide.
Pre-requisites:
The basic techniques of binary exploitation, namely overwriting variables/ return addresses.
This repository was tested on Ubuntu 16.04
General Tips:
- Install
peda
, which is a much more bazinga-ed version of gdb - For format string attack, read documentation on
printf
calling conventions and how arguments are passed to functions for your machine (registers or stack).