Hello GuyZ,
After a long break, I have created another tutorial on Buffer Overflow exploitation. The previous exploitation tutorials are,
Part 1: http://terminalcoders.blogspot.com/2015/08/simple-buffer-overflow-attack-with.html
Part 2: http://terminalcoders.blogspot.com/2015/09/simple-buffer-overflow-attack-with.html
The above tutorials are exploiting Windows Buffer Overflow vulnerabilities using sample application `Cool Player`, Immunity Debugger and Python.
But here, the exploiting Linux x84_64 version (64bit). There is no difference in the exploitation steps, but the registers are different in x84 and x64 versions. Also, the size of register memory are different. The tutorial uses Peda debugger, which is an extension of GDB(Gnu Debugger). You can understand how to use Peda debugger from this tutorial.
After a long break, I have created another tutorial on Buffer Overflow exploitation. The previous exploitation tutorials are,
Part 1: http://terminalcoders.blogspot.com/2015/08/simple-buffer-overflow-attack-with.html
Part 2: http://terminalcoders.blogspot.com/2015/09/simple-buffer-overflow-attack-with.html
Image from: wonderhowto.com |
But here, the exploiting Linux x84_64 version (64bit). There is no difference in the exploitation steps, but the registers are different in x84 and x64 versions. Also, the size of register memory are different. The tutorial uses Peda debugger, which is an extension of GDB(Gnu Debugger). You can understand how to use Peda debugger from this tutorial.