Skip to content

Commit

Permalink
Update Binary_Exploitation.md
Browse files Browse the repository at this point in the history
  • Loading branch information
lw8192 authored Sep 27, 2023
1 parent 6ddb37b commit 8b1b340
Showing 1 changed file with 5 additions and 4 deletions.
9 changes: 5 additions & 4 deletions Exploitation/Binary_Exploitation.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,14 +45,15 @@ Check security protections on a binary:
pattern offset waab #get the offset

## Memory Protections
NX: no execute.
NX: Nonexecutable Stack ret2libc - NX bypass.
DEP: Data Execution Prevention, the CPU will not execute code in the heap or stack.
ASLR:
Canary:

Stack Canary:
ASLR: address space layer randomization. Instead of preventing execution on the stack - randomize the stack memory layout. Attacker won't know where the waiting shellcode is to return execution into it.
Switch off ASLR:

echo 0 > /proc/sys/kernel/randomize_va_space
PIE - Position Independent Executables (PIE), protects against ROP attacks. The binary and it's dependancies are loaded into random locations in virtual memory each time the program is executed.

## Return Oriented Programming
Avoid DEP
https://bordplate.no/blog/en/post/what-is-rop/
Expand Down

0 comments on commit 8b1b340

Please sign in to comment.