Wiki
Forum
FAQ
Suche
Unbeantwortet
Neu
Aktiv
über proggen.org
Team
Todo
User lokal
Status
Impressum
Sie befinden sich hier:
Willkommen bei proggen.org!
»
Sicherheit
»
memory-corruption
Seitenleiste
Community
FAQs
Links
User-Websites
Projekte
Tutorials
Einstieg
Wie starten?
Nativ
C
C++
Build-Systeme
Standard-C-Lib
Qt
Web-Programmierung
HTML
PHP
mehr...
Fachthemen
Algorithmen
Datenstrukturen
Grundlagen
GUIs
Spieleprogrammierung
Sicherheit
Elektronik
mehr...
mehr Themen
Dies ist eine alte Version des Dokuments!
Inhaltsverzeichnis
Memory Corruption Tutorial
Preface
Background Knowledge
Exploitation Techniques
Protection Mechanisms
Sample Collection
References
Online Resources
Books
Memory Corruption Tutorial
Preface
About this tutorial
About the author
Background Knowledge
Memory types
Program execution details
Exploitation Techniques
Basic concepts of buffer overflows
NOP sleds
Environment variable and command line argument buffers
Return-oriented programming (ROP)
Exploiting x64 systems
Exploiting ARM systems
Heap overflows
Protection Mechanisms
Dangerous standard library functions and safe alternatives
Stack protection
Address Space Layout Randomization (ASLR)
Position-independent Executable (PIE)
NX / Data Execution Prevention (DEP)
Control-flow Enforcement Technology
Static code analysis
Sample Collection
References
Online Resources
http://phrack.org/issues/49/14.html
http://de.slideshare.net/saumilshah/dive-into-rop-a-quick-introduction-to-return-oriented-programming
https://azeria-labs.com/writing-arm-assembly-part-1/
https://agilecxx.blogspot.co.at/2017/02/how-to-execute-data.html
https://www.vusec.net/projects/anc/
Books
Hacking: The Art of Exploitation
The Shellcoder's Handbook: Discovering and Exploiting Security Holes