In this lab, you will be attacking a program by causing a buffer overflow.
This lab is described by a writeup in PDF format. The associated support files are available in a tar file that you must download and unpack. Further instructions are in the writeup. The lab will work on some x86-based Linux boxes, although many modern systems incorporate defenses that must be disabled to let it run. However, it's safest to run it on Wilkes, since that's where the grading will be done. (If the statistics page says you solved the problem, then you'll get the correct score.)
Later, you may want to look at the statistics page to see how the class is doing on the lab.
© 2013, Geoff Kuenning
This page is maintained by Geoff Kuenning.