当前位置:网站首页>Research on system and software security (2)
Research on system and software security (2)
2022-04-23 08:01:00 【Xihang】
List of articles
A practical analysis of ROP attacks
arxiv 2021
( The quality of the article is not high )
background
ROP It's actually a code reuse attack , A control flow hijacking attack that does not require an attacker to inject any code , But it can trigger any behavior in the target system , Code reuse attack . Program address space (gadgets) Existing code fragments present in are linked together to perform malicious acts .
The most common one is called return oriented ROP, The other is called challenge oriented programming JOP.
ROP Use to ret Code snippet at the end of the instruction , It's like pop rip equally
In order to complete the attack target :
- Subvert the control flow of a program from its original process , The attacker needs to perform a traditional stack smash attack , For example, stack buffer overflow , And overwrite the return address of the function on the stack . Other methods such as frame pointer overlay can also be used here .
- The attacker needs to redirect the execution of the program to the code chosen by the attacker , An attacker can accomplish this task through code injection .
Modify the memory layout of a program by making the stack non executable , So as to prevent code injection of stack smashing attack . Due to code injection defense &#
版权声明
本文为[Xihang]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230625153696.html
边栏推荐
- 第四章 无形资产
- Zhuang understand's TA notes (VI) < fakeenvreflect & rust, rust effect >
- The problem of exporting excel form with wireframe and internal spacing of form by using web form
- 从ES、MongoDB、Redis、RocketMQ出发谈分布式存储
- SQL user-defined scalar value function that looks up relevant column values n times forward or backward according to a specified table name, column name and column value
- Robust and Efficient Quadrotor Trajectory Generation for Fast Autonomous Flight
- SAP GUI安全性
- Search and replacement of C text file (WinForm)
- Internal network security attack and defense: a practical guide to penetration testing (8): Authority maintenance analysis and defense
- Idea shortcut
猜你喜欢
MySQL -- the secret of lock -- how to lock data
庄懂的TA笔记(六)<FakeEnvReflect && 生锈,锈迹效果>
Ribbon启动流程
Intranet penetration series: icmptunnel of Intranet tunnel (by master dhavalkapil)
Unity获取真实地理地图应用Terrain笔记
SAP自建表log功能开启
The projection vector of a vector to a plane
Buctf MISC brossage
CTF-MISC总结
Chapter IV intangible assets
随机推荐
Zhuang understand's TA notes (VI) < fakeenvreflect & rust, rust effect >
内网渗透系列:内网隧道之icmp_tran
《内网安全攻防:渗透测试实战指南》读书笔记(六):域控制器安全
Automatically fit single line text into the target rectangle
Ctf-misc learning from start to give up
BUUCTF MISC刷题
Complete learning from scratch, machine learning and deep learning, including theory and code implementation, mainly using scikit and mxnet, and some practices (on kaggle)
Redis -- why is the string length of string emstr the upper limit of 44 bytes?
[unity VFX] Introduction notes of VFX special effects - spark production
Introduction to sap query enhanced development
05数组的使用
企业微信免登录跳转自建应用
常用Markdown语法学习
內網滲透系列:內網隧道之icmpsh
Houdini流体>>粒子流体导出到unity笔记
《内网安全攻防:渗透测试实战指南》读书笔记(四):权限提升分析及防御
《内网安全攻防:渗透测试实战指南》读书笔记(七):跨域攻击分析及防御
CTF攻防世界刷题51-
Houdini地形与流体解算(模拟泥石流)
Enterprise wechat login free jump self built application