From 3b99e7f1b57c56d14ce82b60f96628780166d9e6 Mon Sep 17 00:00:00 2001 From: Ben Lorenz <bnlrnz@gmail.com> Date: Mon, 8 Feb 2021 09:51:31 +0100 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 75e6e0a..1ce57f9 100644 --- a/README.md +++ b/README.md @@ -18,7 +18,7 @@ make clean # you know what it does If you enable PIE/PIC you need to recalculate the function address of "secretFunction" and run the buffer overflow in gdb (which disables [aslr](https://en.wikipedia.org/wiki/Address_space_layout_randomization) internally) or temporarily deactivate aslr globally for your kernel or locally in a shell session. -### Global +### Global (needs root) ```bash echo 0 | sudo tee /proc/sys/kernel/randomize_va_space ``` -- GitLab