Replies: 1 comment
-
It looks like it would be possible to add support for these Footnotes |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi,
I teach a security course where some of the assignments involve writing exploits for simple targets.
To make this easier on the students, we disable ASLR and enable exec stacks.
On our servers this is relatively easily done with calls to
personality
(e.g.personality(ADDR_NO_RANDOMIZE |READ_IMPLIES_EXEC)
)When I've tried to build an autograder for this assignment I can't make those calls from a binary running in the Docker container.
(Nor can you do things like modify the relevant
/proc/
bits, its mounted RO)As far as I'm aware, this is due to the seccomp policy the container is run under. I don't believe you can modify that policy from the container image, only from the way the container is started.
Does anyone have a solution for disabling ASLR/execstack for specific binaries inside the autograder?
Thanks.
Beta Was this translation helpful? Give feedback.
All reactions