• Home
  • SEED Labs
  • Lab Setup
  • Documentations
    • Instructor Guides and Manuals
    • Publications
    • Miscellaneous Manuals
  • Workshops
  • About
    • About Us
    • Fundings
    • Who are using SEED Labs?
  • News

Software Security Labs

  • Dirty COW Attack Lab

    Exploiting the Dirty COW race condition vulnerability in Linux kernel to gain the root privilege.

  • Buffer Overflow Vulnerability Lab

    Launching attack to exploit the buffer-overflow vulnerability using shellcode. Conducting experiments with several countermeasures.

  • Return-to-libc Attack Lab

    Using the return-to-libc technique to defeat the "non-executable stack" countermeasure of the buffer-overflow attack.

  • Environment Variable and Set-UID Lab

    This is a redesign of the Set-UID lab (see below).

  • Set-UID Program Vulnerability Lab

    Launching attacks on privileged Set-UID root program. Risks of environment variables. Side effects of system().

  • Race Condition Vulnerability Lab

    Exploiting the race condition vulnerability in privileged program. Conducting experiments with various countermeasures.

  • Format String Vulnerability Lab

    Exploiting the format string vulnerability to crash a program, steal sensitive information, or modify critical data.

  • Shellshock Vulnerability Lab

    Launch attack to exploit the Shellshock vulnerability that is discovered in late 2014.

Copyright © Wenliang Du, Syracuse University