Skip to content

Latest commit

 

History

History
37 lines (25 loc) · 1.53 KB

README.md

File metadata and controls

37 lines (25 loc) · 1.53 KB

ropchain-lab

A lab to explain ropchain exploits

This is part of CyberSword.

This is a docker container that instructs students to overwrite $eip with a buffer overflow to perform a ropchain attack.

Necessary Host System Configuration

The host system will need to be configured to store host files and to disable ASLR

# Disable ASLR
echo 0 | sudo tee /proc/sys/kernel/randomize_va_space
# Store core files in /tmp
echo '/tmp/core.%e.%p' | sudo tee /proc/sys/kernel/core_pattern

Docker Context

This lab expects to be in a docker-compose.yml like this, from CyberSword.

If you don't want to use that, delete the lines that expect the setup scripts.

Resources I used