Skip to content

nkcyber/ropchain-lab

Repository files navigation

ropchain-lab

A lab to explain ropchain exploits

This is part of CyberSword.

This is a docker container that instructs students to overwrite $eip with a buffer overflow to perform a ropchain attack.

Necessary Host System Configuration

The host system will need to be configured to store host files and to disable ASLR

# Disable ASLR
echo 0 | sudo tee /proc/sys/kernel/randomize_va_space
# Store core files in /tmp
echo '/tmp/core.%e.%p' | sudo tee /proc/sys/kernel/core_pattern

Docker Context

This lab expects to be in a docker-compose.yml like this, from CyberSword.

If you don't want to use that, delete the lines that expect the setup scripts.

Resources I used

About

A lab to explain ropchain exploits

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published