Buffer Overflow Attack
University Projects #Cybersecurity#Low-Level Programming
NOTEClick this link to view the full write-up.
Overview
A hands-on security lab demonstrating buffer overflow exploitation—one of the most fundamental and historically significant security vulnerabilities. Covers shellcode execution, NOP sled techniques, stack analysis with GDB, and defeating Address Space Layout Randomization (ASLR).
Key Concepts
- Successfully achieved root shell through buffer overflow exploitation
- Crafted working shellcode payload with proper NOP sled positioning
- Calculated exact memory offsets using GDB stack analysis
- Demonstrated ASLR bypass completing brute force in ~2 minutes
- Documented complete exploitation process with screenshots and analysis
Technologies
C, Assembly (x86), GDB, Python, Linux Security, Shellcode, Memory Exploitation