In this lab, you will be using various buffer-overflow exploits to trick an incautious program into doing your bidding.
This lab is described by a writeup that is available in PDF format.
After you read the writeup, you will need to get a target to attack.
Later, you may want to look at the statistics page to see how you and the class are doing on the lab.
© 2017, Geoff Kuenning
This page is maintained by Geoff Kuenning.