Table of Contents

Session 10 Solutions

ret-to-plt

Idea: The stack would need to look like:

ret-to-libc

Idea: The stack would need to look like:

To find the "/bin/sh" string use the searchmem command in GDB PEDA.

Brute Force

Idea: Used fixed addresses for system() and "/bin/sh" and run the exploit test command until the addresses match.

mprotect

Idea: The stack would need to look like: