[SEEDLAB] SYSTEM SECURITY WRITEUP (Shellcode and Buffer Overflow) #10
First of all, some steps needs to bone to do tasks Disabling ASLR Linking /bin/zsh to /bin/sh Preparing vulnerable stack.c Task1: Exploiting the Vulnerability with BOFStep1. Constructing the content of badfile Following is the part where buffer overflow occurs: buffer address is required to exploit it. by looking at assembly, it can know that buffer.