当前位置:网站首页>Research on system and software security (2)
Research on system and software security (2)
2022-04-23 08:01:00 【Xihang】
List of articles
A practical analysis of ROP attacks
arxiv 2021
( The quality of the article is not high )
background
ROP It's actually a code reuse attack , A control flow hijacking attack that does not require an attacker to inject any code , But it can trigger any behavior in the target system , Code reuse attack . Program address space (gadgets) Existing code fragments present in are linked together to perform malicious acts .
The most common one is called return oriented ROP, The other is called challenge oriented programming JOP.
ROP Use to ret Code snippet at the end of the instruction , It's like pop rip equally
In order to complete the attack target :
- Subvert the control flow of a program from its original process , The attacker needs to perform a traditional stack smash attack , For example, stack buffer overflow , And overwrite the return address of the function on the stack . Other methods such as frame pointer overlay can also be used here .
- The attacker needs to redirect the execution of the program to the code chosen by the attacker , An attacker can accomplish this task through code injection .
Modify the memory layout of a program by making the stack non executable , So as to prevent code injection of stack smashing attack . Due to code injection defense &#
版权声明
本文为[Xihang]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230625153696.html
边栏推荐
- Intranet penetration series: icmptunnel of Intranet tunnel (by master dhavalkapil)
- 【Unity VFX】VFX特效入门笔记-火花制作
- SAP Query增强开发介绍
- Alibaba sentinel学习QA
- Research on software security based on NLP (I)
- SAP TR手动导入系统操作手册
- Chapter IV intangible assets
- strcat()、strcpy()、strcmp()、strlen()
- 内网渗透系列:内网隧道之icmptunnel(DhavalKapil师傅的)
- Teach-Repeat-Replan: A Complete and Robust System for Aggressive Flight in Complex Environments
猜你喜欢

攻防世界MISC刷题1-50

Research on software security based on NLP (I)

Unity C single case mode learning review notes

MySQL--锁的奥秘--数据怎么锁

When using flash, the code ends automatically without an error, the connection cannot be maintained, and the URL cannot be accessed.

Ctf-misc learning from start to give up

Plane definition - plane equation

Enterprise wechat login free jump self built application

ABAP ALV显示金额与导出金额不一致

内网渗透系列:内网隧道之dns2tcp
随机推荐
Three minutes to teach you to use Houdini fluid > > to solve particle fluid droplets
云计算技能大赛 -- openstack私有云环境 第二部分
Internal network security attack and defense: a practical guide to penetration testing (5): analysis and defense of horizontal movement in the domain
Houdini > fluid, rigid body export, learning process notes
Analysis of Nacos source code
Unity gets a resource that is referenced by those resources
Chapter V investment real estate
String self generated code within a given range
三分钟教你用Houdini流体>>解算粒子流体水滴
Weblux file upload and download
Enterprise wechat login free jump self built application
Intranet penetration series: icmpsh of Intranet tunnel
常用Markdown语法学习
Chapter VII asset impairment
庄懂的TA笔记(零)<铺垫与学习方法>
SQL user-defined scalar value function that looks up relevant column values n times forward or backward according to a specified table name, column name and column value
从ES、MongoDB、Redis、RocketMQ出发谈分布式存储
Export all SVG files in the specified path into pictures in PNG format (thumbnail or original size)
Towords Open World Object Detection
内网渗透系列:内网隧道之dns2tcp