Below are brief description. I can discuss the full instructions in chat.
n interesting attack on buffer-overflow vulnerability; this attack can bypass an existing protection scheme currently implemented in Linux operating systems. A common way to exploit a buffer-overflow vulnerability is to overflow the buffer with a malicious shellcode, and then cause the vulnerable program to jump to the shellcode that is stored in the stack. To prevent this kind of attacks, some operating systems, such as Fedora Linux, allow system administrators to make stacks non-executable; therefore, jumping to the shellcode will cause the program to fail.
These are the files that would be needed.
retlib.c: the vulnerable program
[login to view URL]: the skeleton exploit code in Python
exploit.c: the skeleton exploit code in C
Hi. I have good experience with these skills. I have worked on Kali Linux before. To force it, several options of compilation will be needed. Please contact me if you are interested in. Thank you.