Project Title

App Security Exercise

Description

This is a course project from the University of Michigan's EECS 388 (Computer Security) course. Using GDB in a Kali Linux Virtual Machine, seven vulnerable C programs were exploited and hijacked using buffer overflow, return to libc, integer overflow, nop slides, buffer over-read, stack shellcode, pointers, and return oriented programming chains.


Icon made by Freepik from www.flaticon.com
Second image is a few random ROPgadgets found w/ ROPgadget. Third image is from this x86 guide.
Project Dates

2020