Linux Binary Exploitation

Stack Buffer Overflows

Stack Buffer Overflows: Linux - Chapter 1
Introduction to the general principle of Stack Buffer Overflows

Stack Buffer Overflows: Linux 2 - Using GDB
How to use GDB when performing a stack overwrite

Stack Buffer Overflows: Linux 3 - Bypassing DEP with ROP
Short introduction to the concept of ROP-chains

richsanchez' Exploit Mitigation Technologies Series

This series is absolutely fantastic as it covers the basics of how the simple exploit mitigation's came about, and some methods that have been developed to bypass them. I'd highly recommend this series.
Exploit Mitigation Techniques - Data Execution Prevention (DEP)
Exploit Mitigation Techniques - Stack Canaries Exploit Mitigation Techniques - Address Space Layout Randomization (ASLR)

Further Reading

return to csu
Nothing major in this publication but goes through finding interesting gadgets within a binary that wouldn't normally be picked up by classic tools.

Heap Exploitation

The Art of Exploiting Heap overflow Part 6
There's no need to over-complicate the unlink exploit. It's quite simple but unfortunately so many guides insist on showing you the entire structure of the heap. Don't get me wrong, you're going to need to understand it, but at the end of the day you're trying to understand a fundamental exploit, and a lot of that gets in the way. This blog post is concise, and gets the point across quickly.

results matching ""

    No results matching ""