Wiki
Forum
FAQ
Suche
Unbeantwortet
Neu
Aktiv
über proggen.org
Team
Todo
User lokal
Status
Impressum
Sie befinden sich hier:
Willkommen bei proggen.org!
»
Sicherheit
»
memory-corruption
Seitenleiste
Community
FAQs
Links
User-Websites
Projekte
Tutorials
Einstieg
Wie starten?
Nativ
C
C++
Build-Systeme
Standard-C-Lib
Qt
Web-Programmierung
HTML
PHP
mehr...
Fachthemen
Algorithmen
Datenstrukturen
Grundlagen
GUIs
Spieleprogrammierung
Sicherheit
Elektronik
mehr...
mehr Themen
Dies ist eine alte Version des Dokuments!
Inhaltsverzeichnis
Memory Corruption Tutorial
Preface
Background Knowledge
Exploitation Techniques
Protection Mechanisms
Sample Collection
References
Online Resources
Books
Memory Corruption Tutorial
Preface
About this tutorial
About the author
Background Knowledge
Details of program execution and function calls
Exploitation Techniques
Basic concepts of buffer overflows
NOP sleds
Environment variable and command line argument buffers
Heap spraying
Return oriented programming
Exploiting x64 systems
Exploiting ARM systems
Protection Mechanisms
Dangerous standard library functions and safe alternatives
Stack protection
Address Space Layout Randomization (ASLR)
Position Independent Code (PIE)
NX / Data Execution Prevention (DEP)
Static code analysis
Sample Collection
References
Online Resources
http://phrack.org/issues/49/14.html
http://de.slideshare.net/saumilshah/dive-into-rop-a-quick-introduction-to-return-oriented-programming
https://azeria-labs.com/writing-arm-assembly-part-1/
https://agilecxx.blogspot.co.at/2017/02/how-to-execute-data.html
https://www.vusec.net/projects/anc/
Books
Hacking: The Art of Exploitation
The Shellcoder's Handbook: Discovering and Exploiting Security Holes