Skip to content

A lab to explain ropchain exploits with more complex logic

License

Notifications You must be signed in to change notification settings

nkcyber/ropchain-logic

 
 

Repository files navigation

ropchain-lab

A lab to explain ropchain exploits

This is part of CyberSword.

This is a docker container that instructs students to overwrite $eip with a buffer overflow to perform a ropchain attack.

Necessary Host System Configuration

The host system will need to be configured to store host files and to disable ASLR

# Disable ASLR
echo 0 | sudo tee /proc/sys/kernel/randomize_va_space
# Store core files in /tmp
echo '/tmp/core.%e.%p' | sudo tee /proc/sys/kernel/core_pattern

Docker Context

This lab expects to be in a docker-compose.yml like this, from CyberSword.

If you don't want to use that, delete the lines that expect the setup scripts.

Resources I used

About

A lab to explain ropchain exploits with more complex logic

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 48.5%
  • Dockerfile 28.4%
  • C 15.1%
  • Shell 5.5%
  • Makefile 2.5%