TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Shellcode Injection

132 点作者 piyush8311超过 9 年前

7 条评论

cedricvg超过 9 年前
Almost every program nowadays is compiled with W^X (--no_execstack) by default which means the memory is not executable and writable at once (Windows equivalent is DEP). Still a good example of how a basic overflow can lead to arbitrary code execution. A follow-up post using ROP or return-to-libc would be interesting, with W^X enabled.
评论 #10797071 未加载
juanuys超过 9 年前
My favourite resource for these types of exploits used to be phiral.com (see Wayback Machine circa March 2007 [1], since it doesn&#x27;t exist anymore), belonging to author Jon Erickson who wrote &quot;Hacking: the Art of Exploitation&quot; [2].<p>[1] <a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20070305111749&#x2F;http:&#x2F;&#x2F;phiral.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20070305111749&#x2F;http:&#x2F;&#x2F;phiral.com...</a><p>[2] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Hacking:_The_Art_of_Exploitation" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Hacking:_The_Art_of_Exploitati...</a>
评论 #10797075 未加载
trampi超过 9 年前
The same author refers to another article of him, in which he explains the basics of buffer overflows quite nice. <a href="https:&#x2F;&#x2F;dhavalkapil.com&#x2F;blogs&#x2F;Buffer-Overflow-Exploit&#x2F;" rel="nofollow">https:&#x2F;&#x2F;dhavalkapil.com&#x2F;blogs&#x2F;Buffer-Overflow-Exploit&#x2F;</a>
dimdimdim超过 9 年前
Here are 2 good courses on Assembly and Shellcoding on x86 and x86_64 if you are interested:<p><a href="http:&#x2F;&#x2F;www.pentesteracademy.com&#x2F;topics?v=nhr" rel="nofollow">http:&#x2F;&#x2F;www.pentesteracademy.com&#x2F;topics?v=nhr</a>
Ecco超过 9 年前
Why &quot;echo 0 | dd of=foo&quot; and not simply &quot;echo 0 &gt; foo&quot;?
评论 #10796902 未加载
dmeeze超过 9 年前
I must be missing something. If you can create an executable which is suid you already have root...
评论 #10796852 未加载
amenod超过 9 年前
&gt; ... -fno-stack-protector -z execstack<p>Does anyone know how common stack protector is in the wild?
评论 #10798246 未加载
评论 #10796929 未加载
评论 #10796936 未加载