Instructor Guidelines and Manuals
Who are using SEED Labs?
Software Security Labs
Environment Variable and Set-UID Lab
Launching attacks on privileged Set-UID root program. Risks of environment variables, side effects of the
Buffer Overflow Attack Lab (Set-UID Version)
Launching attack on privileged Set-UID programs to exploit their buffer-overflow vulnerability. Conducting experiments on countermeasures.
Buffer Overflow Attack Lab (Server Version)
Launching attack on server programs to exploit their buffer-overflow vulnerability. Conducting experiments on countermeasures.
Return-to-Libc Attack Lab (32-bit)
Using the return-to-libc technique to defeat the "non-executable stack" countermeasure of the buffer-overflow attack.
Shellcode Development Lab
Shellcode is widely used in attacks, and writing shellcode is challenging. In this lab, students will write shellcode from scratch.
Format String Vulnerability Lab
Exploiting the format string vulnerability to crash a program, steal sensitive information, and inject malicious code.
Race Condition Vulnerability Lab
Exploiting the race condition vulnerability in privileged program. Conducting experiments with various countermeasures.
Dirty COW Attack Lab
Exploiting the Dirty COW race condition vulnerability in Linux kernel to gain the root privilege.