This is an assignment for my Systems Security and Malicious Code course. I exploited ARM and x86 using buffer overflow vulnerabilities to execute shellcode.
-
files
This directory contains exploit scripts -
exploit.py
for each part where applicableinput files to the binaries are located in the
tmp
subdirectory of each part.For example,
files/part2/arm/tmp/exp
would be the input file for the part2 ARM exercise. -
submission
This directory contains submission files used
-
submission.md
My solutions for each exercise with input explanations and the hashes obtained
-
Assignment 2 Writeup
A detailed writeup that explains each exercise step by step.
Note that the naming convention for the files in the writeup is slightly different.
/tmp/anmol.py
and/tmp/anmol-p3.py
on the server correspond toexploit.py
which is provided in the repository./tmp/anmol
and/tmp/anmol-p3
on the server correspond totmp/exp
which is provided in the repository.