You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: readme.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ known to have a buffer overflow.
7
7
The webserver has been compiled four times, with increasing levels of memory protections.
8
8
For every version, an exploit that defeats the mitigations and launches a remote shell has been written.
9
9
10
-
- tiny.1996 : no protections. Compiled statically, with an executable stack and no canaries like it's 1996
10
+
-[tiny.1996](https://github.com/robalb/tiny-webserver-rce-exploit/blob/master/expl_1996.py) : no protections. Compiled statically, with an executable stack and no canaries like it's 1996
11
11
- tiny.canary: executable stack, but with stack canaries enabled
12
12
- tiny.nx: both canary and nx protection active
13
13
- tiny.all: all protections active: canary, nx, ASLR, relro
0 commit comments