当前位置:网站首页>Research on system and software security (2)
Research on system and software security (2)
2022-04-23 08:01:00 【Xihang】
List of articles
A practical analysis of ROP attacks
arxiv 2021
( The quality of the article is not high )
background
ROP It's actually a code reuse attack , A control flow hijacking attack that does not require an attacker to inject any code , But it can trigger any behavior in the target system , Code reuse attack . Program address space (gadgets) Existing code fragments present in are linked together to perform malicious acts .
The most common one is called return oriented ROP, The other is called challenge oriented programming JOP.
ROP Use to ret Code snippet at the end of the instruction , It's like pop rip equally
In order to complete the attack target :
- Subvert the control flow of a program from its original process , The attacker needs to perform a traditional stack smash attack , For example, stack buffer overflow , And overwrite the return address of the function on the stack . Other methods such as frame pointer overlay can also be used here .
- The attacker needs to redirect the execution of the program to the code chosen by the attacker , An attacker can accomplish this task through code injection .
Modify the memory layout of a program by making the stack non executable , So as to prevent code injection of stack smashing attack . Due to code injection defense &#
版权声明
本文为[Xihang]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230625153696.html
边栏推荐
- Using lambda expression to solve the problem of C file name sorting (whether it is 100 or 11)
- 内网渗透系列:内网隧道之icmptunnel(jamesbarlow师傅的)
- 聊聊接口幂等与消费幂等的本质
- 一文了解系列,对web渗透的常见漏洞总结(持续更新)
- 索引被锁数据无法写入ES问题处理
- Unity gets a resource that is referenced by those resources
- Houdini流体>>粒子流体导出到unity笔记
- Unity gets the resources that a file depends on
- Alibaba sentinel学习QA
- Automatically fit single line text into the target rectangle
猜你喜欢
Houdini地形与流体解算(模拟泥石流)
内网渗透系列:内网隧道之dnscat2
云计算技能大赛 -- openstack私有云环境 第一部分
如何展示您的数字作品集:来自创意招聘人员的建议
第七章 资产减值
Intranet penetration series: icmptunnel of Intranet tunnel (by master dhavalkapil)
内网渗透系列:内网隧道之icmpsh
SAP GUI security
Teach-Repeat-Replan: A Complete and Robust System for Aggressive Flight in Complex Environments
Robust and Efficient Quadrotor Trajectory Generation for Fast Autonomous Flight
随机推荐
Common markdown grammar learning
MySQL8. 0 installation / uninstallation tutorial [window10 version]
内网渗透系列:内网隧道之pingtunnel
Talk about the essence of interface idempotent and consumption idempotent
Chapter IV intangible assets
Redis事务实现乐观锁原理
第七章 资产减值
企业微信免登录跳转自建应用
The displayed amount of ABAP ALV is inconsistent with the exported amount
内网渗透系列:内网隧道之icmptunnel(DhavalKapil师傅的)
SAP STO With Billing流程与配置
Research on software security based on NLP (I)
VBA调用SAP RFC实现数据读取&写入
庄懂的TA笔记(七)<Lambert+Phong+Shadow+3EvColor+AO>
Shapley Explanation Networks
Suggestions on university learning route planning
05数组的使用
第五章 投资性房地产
C # use laida criterion (3) σ Criteria) reject abnormal data (.Net reject singular values in a group of data)
C#控制相机,旋转,拖拽观察脚本(类似Scenes观察方式)