Inhaltsverzeichnis
Memory Corruption Tutorial
Preface
Background Knowledge
Exploitation Techniques
Protection Mechanisms
Discussion
License
Memory Corruption Tutorial
Preface
About this tutorial
About the author
Background Knowledge
Memory types
Program execution details
Exploitation Techniques
Basic concepts of buffer overflows
NOP sled
Environment variable and command line argument buffers
Return-oriented programming (ROP)
Protection Mechanisms
Dangerous standard library functions and safer alternatives
ASCII-armored addresses
Stack protection
Address Space Layout Randomization (ASLR)
Position-independent Executable (PIE)
NX bit
Control-flow Integrity (CFI)
Static code analysis
Discussion
General discussion about this tutorial
License
This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License
.