handouts/ho03.tex
changeset 240 4b2eeb0ddd81
parent 238 6ba55ba5b588
child 257 9bc912fcedb6
equal deleted inserted replaced
239:0db764174afb 240:4b2eeb0ddd81
   689 \begin{center}
   689 \begin{center}
   690 \url{http://www.mgraziano.info/docs/stsi2010.pdf}
   690 \url{http://www.mgraziano.info/docs/stsi2010.pdf}
   691 \end{center}
   691 \end{center}
   692 
   692 
   693 \noindent updates, as the name says, most information to 2010.
   693 \noindent updates, as the name says, most information to 2010.
   694 There are also sources for buffer overflow attack in  
   694 There is another Phrack article about return-into-lib(c) exploits 
       
   695 from 2012:
       
   696 
       
   697 \begin{center}
       
   698 \url{http://phrack.org/issues/58/4.html}
       
   699 \end{center}
       
   700 
       
   701 \noindent
       
   702 The main topic is about getting around the non-executability of stack
       
   703 data (in case it is protected).  This article gives some further
       
   704 pointers into the recent literature about buffer overflow attacks.
       
   705 
       
   706 Buffer overflow attacks are not just restricted to Linux and 
       
   707 ``normal'' computers. There is a book
       
   708 
       
   709 \begin{quote}\rm 
       
   710 ``iOS Hacker's Handbook'' by Miller et al, Wiley, 2012
       
   711 \end{quote}
       
   712 
       
   713 \noindent
       
   714 which seem to describe buffer overflow attacks on iOS. A book from the
       
   715 same publisher exists also for Android (from 2014) which seem to also
       
   716 feature buffer overflow attacks. Alas I do not own copies of these
       
   717 books.
   695 
   718 
   696 
   719 
   697 \subsubsection*{A Crash-Course for GDB}
   720 \subsubsection*{A Crash-Course for GDB}
   698 
   721 
   699 If you want to try out the examples from KEATS it might be
   722 If you want to try out the examples from KEATS it might be