Home
Lab Setup
SEED Labs
Books
Lectures
Workshops
Resources
Instructor Guidelines and Manuals
About Us
Fundings
Who are using SEED Labs?
Publications
Miscellaneous Manuals
Home
Lab Setup
SEED Labs
Books
Lectures
Workshops
Home
Lab Setup
SEED Labs
Books
Lectures
Workshops
Software Security Labs
Environment Variable and Set-UID Lab
Launching attacks on privileged Set-UID root program. Risks of environment variables, side effects of the
system()
function.
Buffer Overflow Attack Lab (Set-UID Version)
Launching attack on privileged Set-UID programs to exploit their buffer-overflow vulnerability. Conducting experiments on countermeasures.
Buffer Overflow Attack Lab (Server Version)
Launching attack on server to exploit buffer-overflow vulnerability. Conducting experiments on countermeasures.
Buffer Overflow Attack Lab (ARM64)
Launching attacks on server to exploit buffer-overflow vulnerability. Conducting experiments on countermeasures. For Apple Silicon machines only.
Return-to-Libc Attack Lab (32-bit)
Using the return-to-libc technique to defeat the "non-executable stack" countermeasure of the buffer-overflow attack.
Shellcode Development Lab
Shellcode is widely used in attacks, and writing shellcode is challenging. In this lab, students will write shellcode from scratch.
Format String Vulnerability Lab
Exploiting the format string vulnerability to crash a program, steal sensitive information, and inject malicious code.
Race Condition Vulnerability Lab
Exploiting the race condition vulnerability in privileged program. Conducting experiments with various countermeasures.
Dirty COW Attack Lab
Exploiting the Dirty COW race condition vulnerability in Linux kernel to gain the root privilege.