Buffer Overflow Attacks Over Various Programs based on x86 Architecture
• Crafted exploits to gain arbitrary code execution by overflowing buffers and bypassing modern defenses like ASLR, DEP, and stack canaries in multiple C programs and performed static and dynamic analysis of programs using objdump, strings, ltrace, and gdb to identify vulnerabilities.
• Utilized GDB in multiple Linux distributions to inspect disassembly of codes in runtime; followed by execution of attacks like ret2libc and ROP chains to bypass modern systems protections like non-executable stacks.
• Performed malware analysis in controlled VMs using tools like Androguard, Wireshark, along with recommending mitigation strategies in detailed technical reports for various cybersecurity vulnerabilities.
This was a course project so direct access to the commands is not given. But please go through the reports to get a comprehensive overview of the step-by-step assessments and reports.
pegasus-01 / buffer-overflow Goto Github PK
View Code? Open in Web Editor NEW• Mitigated multiple vulnerabilities in x86 assembly programs throughout the project with GDB in Ubuntu.