Tags » ASLR

Researchers Find Dangerous Intel Chip Flaw

This is a potentially a serious flaw.  Memory exploits can have significant repercussions, especially in POS environments and other devices where sensitive data lives in memory before encryption. 6 more words

Security News


1. 시스템 보안 개론
* SEH overwriting은 canary를 우회할 수 있다.

* gets(buf) 함수는 입력으로 들어오는 스트링의 크기를 확인하지 않는다는 문제가 있다. 입력 크기를 확인해서 문제를 해결할 수 있음. 117 more words

1) Memo

What Did I Just Do? Breaking Down The Shellcode Example.

Last post we got some shellcode to execute in the notesearch program from HTAE.  I basically followed what Jon Erickson did with some minor modifications to make the exploit work on the Debian-32 machine that I’ve been using.  949 more words


Digging in the Heap

The Heap

The heap is another area of memory that a program in execution uses.  We have discussed it before and we know that it’s different from the stack because we may allocate it and free it during programming.  861 more words

Hacking The Art Of Exploitation

Stack Overflow Continued.

This time we are going to look at what happens when ASLR is left in place, and when we move to a 64 bit Debian distro. 1,904 more words

Hacking The Art Of Exploitation

VideoLAN Releases VLC Version 2.2.4

In early June the open source media player VLC created by the VideoLAN non-profit organization was updated to version 2.2.4.

This update is available for Linux, Apple Mac OS X and Windows. 127 more words

Security Advice