Inhaltsverzeichnis
Memory Corruption Tutorial
Preface
Background Knowledge
Exploitation Techniques
Protection Mechanisms
License
Memory Corruption Tutorial
Preface
About this tutorial
About the author
Background Knowledge
Memory types
Program execution details
Exploitation Techniques
Basic concepts of buffer overflows
NOP sled
Environment variable and command line argument buffers
Return-oriented programming (ROP)
Exploiting x64 systems
Exploiting ARM systems
Heap overflows
Protection Mechanisms
Dangerous standard library functions and safer alternatives
ASCII-armored addresses
Stack protection
Address Space Layout Randomization (ASLR)
Position-independent Executable (PIE)
NX bit
Control-flow Integrity (CFI)
Static code analysis
License
This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License
.