Exploiting Memory Vulnerabilities
A PDF copy of the spec is available here.
- Due: Tuesday, July 6, 11:59 PM PT
- Most recent update: Monday, February 9, 2021
In this project, you will be exploiting a series of vulnerable programs on a virtual machine. You may work in teams of 1 or 2 students.
This project has a story component. Reading it is not necessary for project completion.
For corrections please contact Jinan at jinan@berkeley.edu, or make a Piazza post.