![Lead Image © Maksim Kabou, 123RF.com Lead Image © Maksim Kabou, 123RF.com](/var/ezflow_site/storage/images/archive/2015/25/from-debugging-to-exploiting/po-24008-123rf-maksim_kabou_123rf-digitaler_schl_ssel_in_3d_resized.png/108508-1-eng-US/PO-24008-123RF-Maksim_Kabou_123RF-Digitaler_Schl_ssel_in_3D_resized.png_medium.png)
Lead Image © Maksim Kabou, 123RF.com
From debugging to exploiting
Secure Code
A number of modern protections are used to make software a bit more secure. Some of these are kernel based, whereas others are compiler based. In this article, I present a proof of concept capable of bypassing protections and exploiting code.
Many published papers have focused on the exploitation of ELF (executable and linkable format) binaries – a Linux standard file format – which bypasses modern protection techniques. (Table 1 lists a few techniques discussed in this article.) However, in some scenarios in which security has not historically been in the forefront, these protections are never applied, or, if so, the software holds many flaws that can still lead to a successful exploitation.
Table 1
Security Techniques
Acronym | Method |
---|---|
ASLR | Address space layout randomization |
NX/DEP | No-execute bit/data execution prevention |
RELRO | Relocation read-only |
SSP | Stack smashing protector |
PIE | Position-independent executable |
Modern
...Buy this article as PDF
(incl. VAT)