Skip to content
This repository has been archived by the owner on Jun 15, 2023. It is now read-only.

Latest commit

 

History

History
8 lines (5 loc) · 565 Bytes

README.md

File metadata and controls

8 lines (5 loc) · 565 Bytes

Buffer Overflow I

Please proceed to the bufferoverflow folder.

You will be exploiting the buffer overflow vulnerability to override the address of a pointer.

Your job is to provide malicious input to the program launcher. Once you run it, the program will wait for your input. It's the same program that we talked about in the lecture. Please refer to the pointer addresses printed out to the screen to exploit the buffer overflow. If you successfully override the address, you will have the correct flag; otherwise, you will see the fake flag.

Good luck.