Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
Information about my advisory on CVE-2006-3747 (Apache mod_rewrite LDAP off-by-one buffer overflow).. At the time, it was the first public working exploit :)
........... The projects and homeworks are part of the course CSE-565 : Computer Security [Fall 2018 @ UB_SUNY]................ Course Instructor : Marina Blanton (http://www.acsu.buffalo.edu/~mblanton/)
Demonstration of some attacks exploiting security vulnerabilities of websites and OSs as tasks of Computer Security LAB, CSE 406 in Level-4, Term-1 of CSE, BUET